1. Henderson DA. The looming threat of bioterrorism. Science. 1999:283(5406):1279-82. [
Link] [
DOI:10.1126/science.283.5406.1279] [
PMID]
2. Bellamy RJ, Freedman AR. Bioterrorism. Int J Med. 2001;94(4):227-34. [
Link] [
DOI:10.1093/qjmed/94.4.227]
3. Christopher LG, Cieslak LT, Pavlin JA, Eitzen EM. Biological warfare: A historical perspective. Jama. 1997;278(5):412-7.
https://doi.org/10.1001/jama.1997.03550050074036 [
Link] [
DOI:10.1001/jama.278.5.412]
4. Karwa M, Bronzert P, Kvetan V. Bioterrorism and critical care. Crit Care Clin. 2003;19(2):279-313. [
Link] [
DOI:10.1016/S0749-0704(02)00053-2]
5. DaSilva EJ. Biological warfare, bioterrorism, biodefence and the biological and toxin weapons convention. Electron J Biotechnol. 1999;2(3):3-4. [
Link] [
DOI:10.2225/vol2-issue3-fulltext-2]
6. Barras V, Greub G. History of biological warfare and bioterrorism. Clin Microbiol Infect. 2014;20(6):497-502. [
Link] [
DOI:10.1111/1469-0691.12706] [
PMID]
7. Krallinger M, Leitner F, Valencia A. Analysis of biological processes and diseases using text mining approaches. Bioinform Methods Clin Res. 2010;593:341-82. [
Link] [
DOI:10.1007/978-1-60327-194-3_16] [
PMID]
8. Rodriguez-Esteban R. Biomedical text mining and its applications. PLoS Comput Biol. 2009;5(12):e1000597. [
Link] [
DOI:10.1371/journal.pcbi.1000597] [
PMID] [
PMCID]
9. Sirmakessis S, Mining for gems of information. In: Sirmakessis S, editor. Text mining and its applications: Results of the NEMIS Launch Conference. New York: Springer; 2004. pp. 1-6.
https://doi.org/10.1007/978-3-540-45219-5 [
Link] [
DOI:10.1007/978-3-540-45219-5_1]
10. Hu X, Zhang X, Wu D, Zhou X, Rumm P, Text mining the biomedical literature for identification of potential virus/bacterium as bio-terrorism weapons. In: Chen H, Reid E, Sinai J, Silke A, Ganor B, editors, Terrorism Informatics. Hamburg: Springer; 2008. pp. 385-406. [
Link] [
DOI:10.1007/978-0-387-71613-8_18] [
PMCID]
11. Swanson DR. Undiscovered public knowledge. Libr Q. 1986;56(2):103-18. [
Link] [
DOI:10.1086/601720]
12. Jacobs MK. The history of biologic warfare and bioterrorism. Dermatol Clin. 2004;22(3):231-46. [
Link] [
DOI:10.1016/j.det.2004.03.008] [
PMID]
13. Subirana M, Solá I, Garcia JM, Gich I, Urrútia G. A nursing qualitative systematic review required MEDLINE and CINAHL for study identification. J Clin Epidemiol. 2005;58(1):20-5. [
Link] [
DOI:10.1016/j.jclinepi.2004.06.001] [
PMID]
14. Wheeler DL, Barrett T, Benson DA, Bryant SH, Canese K, Chetvernin V, et al. Database resources of the National Center for Biotechnology Information. Nucleic Acids Res. 2007;35:5-12. [
Link] [
DOI:10.1093/nar/gkl1031] [
PMID] [
PMCID]
15. Falagas ME, Pitsouni EI, Malietzis GA, Pappas G. Comparison of PubMed, Scopus, web of science, and Google scholar: Strengths and weaknesses. The FASEB J. 2008;22(2):338-42. [
Link] [
DOI:10.1096/fj.07-9492LSF] [
PMID]
16. Lodhi H, Saunders C, Shawe-Taylor J, Cristianini N, Watkins C. Text classification using string kernels. J Mach Learn Res. 2002;2:419-44. [
Link]
17. Ponmuthuramalingam P, Devi T. Effective term based text clustering algorithms. Int J Comput Sci Eng. 2010;2(5):1665-73. [
Link]
18. Xiaojun Z, Michael W, Berry and Jacob Kogan, editors. Text mining: Applications and theory. Inf Retr. 2011;14(2):208-11. [
Link]
19. Chaurasia N, Dhakar M, Tiwari A, Gupta RK. A survey on terrorist network mining: Current trends and opportunities. Int J Comput Sci Eng Surv. 2012;3(4):59-66. [
Link] [
DOI:10.5121/ijcses.2012.3405]
20. Schmitt K, Zacchia NA. Total decontamination cost of the anthrax letter attacks. Biosecur Bioterror: Biodef Strategy Pract Sci. 2012;10(1):98-107. [
Link] [
DOI:10.1089/bsp.2010.0053] [
PMID]
21. Kortepeter MG, Parker GW. Potential biological weapons threats. Emerg Infect Dis. 1999;5(4):523-7. [
Link] [
DOI:10.3201/eid0504.990411] [
PMID] [
PMCID]
22. Jernigan JA, Stephens DS, Ashford DA, Omenaca C, Topiel MS, Galbraith M, et al. Bioterrorism-related inhalational anthrax: The first 10 cases reported in the United States. Emerg Infect Dis. 2001;7(6):933-44. [
Link] [
DOI:10.3201/eid0706.010604] [
PMID] [
PMCID]
23. Grönvall GK. A new role for scientists in the Biological Weapons Convention. Nat Biotechnol. 2005;23(10):1213-6. [
Link] [
DOI:10.1038/nbt1005-1213] [
PMID]
24. Kulkarni Sh, Baban Pawar S, Satpute G. Terror Detection Using Text Mining. Imp J Interdiscip Res. 2016;2(5):1882-5. [
Link]