{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:57:18Z","timestamp":1776085038548,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:00:00Z","timestamp":1519084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s00500-018-3084-2","type":"journal-article","created":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T18:35:59Z","timestamp":1519151759000},"page":"4315-4327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["Heuristic nonlinear regression strategy for detecting phishing websites"],"prefix":"10.1007","volume":"23","author":[{"given":"Mehdi","family":"Babagoli","sequence":"first","affiliation":[]},{"given":"Mohammad Pourmahmood","family":"Aghababa","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Solouk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,20]]},"reference":[{"key":"3084_CR1","doi-asserted-by":"publisher","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamid","year":"2014","unstructured":"Abdelhamid N, Ayesh A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41:5948\u20135959","journal-title":"Expert Syst Appl"},{"key":"3084_CR2","doi-asserted-by":"crossref","unstructured":"Aburrous M, Hossain MA, Thabatah F, Dahal K (2008) Intelligent phishing website detection system using fuzzy techniques. In: 3rd international conference on information and communication technologies: from theory to applications. ICTTA 2008. IEEE, pp 1\u20136","DOI":"10.1109\/ICTTA.2008.4530019"},{"key":"3084_CR3","doi-asserted-by":"publisher","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","volume":"37","author":"M Aburrous","year":"2010","unstructured":"Aburrous M, Hossain MA, Dahal K, Thabtah F (2010) Intelligent phishing detection system for e-banking using fuzzy data mining. Expert Syst Appl 37:7913\u20137921","journal-title":"Expert Syst Appl"},{"key":"3084_CR4","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1080\/0305215X.2015.1120299","volume":"48","author":"K Ameli","year":"2016","unstructured":"Ameli K, Alfi A, Aghaebrahimi M (2016) A fuzzy discrete harmony search algorithm applied to annual cost reduction in radial distribution systems. Eng Optim 48:1529\u20131549","journal-title":"Eng Optim"},{"key":"3084_CR5","doi-asserted-by":"crossref","unstructured":"Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. In: Soft computing applications in industry. Springer, pp 373\u2013383","DOI":"10.1007\/978-3-540-77465-5_19"},{"key":"3084_CR6","doi-asserted-by":"crossref","unstructured":"Bottazzi G, Casalicchio E, Cingolani D, Marturana F, Piu M (2015) MP-Shield: a framework for phishing detection in mobile devices. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing (CIT\/IUCC\/DASC\/PICOM). IEEE, pp 1977\u20131983","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.293"},{"key":"3084_CR7","doi-asserted-by":"publisher","first-page":"3692","DOI":"10.1093\/nar\/gkg600","volume":"31","author":"C Cai","year":"2003","unstructured":"Cai C, Han L, Ji ZL, Chen X, Chen YZ (2003) SVM-Prot: web-based support vector machine software for functional classification of a protein from its primary sequence. Nucleic Acids Res 31:3692\u20133697","journal-title":"Nucleic Acids Res"},{"key":"3084_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10766-014-0330-9","volume":"44","author":"J Cao","year":"2016","unstructured":"Cao J, Li Q, Ji Y, He Y, Guo D (2016) Detection of forwarding-based malicious URLs in online social networks. Int J Parallel Prog 44:163\u2013180","journal-title":"Int J Parallel Prog"},{"key":"3084_CR9","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1080\/01932691.2015.1077455","volume":"37","author":"BA Fil","year":"2016","unstructured":"Fil BA, Korkmaz M, \u00d6zmetin C (2016) Application of nonlinear regression analysis for methyl violet (MV) dye adsorption from solutions onto illite clay. J Dispers Sci Technol 37:991\u20131001","journal-title":"J Dispers Sci Technol"},{"key":"3084_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.14257\/ijast.2015.78.03","volume":"78","author":"R Gupta","year":"2015","unstructured":"Gupta R, Shukla PK (2015) System design, investigation and countermeasure of phishing attacks using data mining classification methods and its analysis. Int J Adv Sci Technol 78:29\u201340","journal-title":"Int J Adv Sci Technol"},{"key":"3084_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11:10\u201318","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"3084_CR12","unstructured":"Hamid IRA, Abawajy J (2011) Phishing email feature selection approach. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE, pp 916\u2013921"},{"key":"3084_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2016.01.037","volume":"364","author":"Y-L He","year":"2016","unstructured":"He Y-L, Wang X-Z, Huang JZ (2016) Fuzzy nonlinear regression analysis using a random weight network. Inf Sci 364:222\u2013240","journal-title":"Inf Sci"},{"key":"3084_CR14","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s10957-017-1066-7","volume":"172","author":"J Jahn","year":"2017","unstructured":"Jahn J (2017) Karush\u2013Kuhn\u2013Tucker conditions in set optimization. J Optim Theory Appl 172:707\u2013725","journal-title":"J Optim Theory Appl"},{"key":"3084_CR15","doi-asserted-by":"crossref","unstructured":"Jeong SY, Koh YS, Dobbie G (2016) Phishing detection on twitter streams. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 141\u2013153","DOI":"10.1007\/978-3-319-42996-0_12"},{"key":"3084_CR16","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1080\/0305215X.2015.1090570","volume":"48","author":"J Kalivarapu","year":"2016","unstructured":"Kalivarapu J, Jain S, Bag S (2016) An improved harmony search algorithm with dynamically varying bandwidth. Eng Optim 48:1091\u20131108","journal-title":"Eng Optim"},{"key":"3084_CR17","doi-asserted-by":"publisher","first-page":"3902","DOI":"10.1016\/j.cma.2004.09.007","volume":"194","author":"KS Lee","year":"2005","unstructured":"Lee KS, Geem ZW (2005) A new meta-heuristic algorithm for continuous engineering optimization: harmony search theory and practice. Comput Methods Appl Mech Eng 194:3902\u20133933","journal-title":"Comput Methods Appl Mech Eng"},{"key":"3084_CR18","doi-asserted-by":"publisher","first-page":"4736","DOI":"10.1016\/j.ijleo.2015.08.219","volume":"127","author":"K Li","year":"2016","unstructured":"Li K, Wang F, Zhang L (2016) A new algorithm for image recognition and classification based on improved Bag of Features algorithm. Opt Int J Light Electron Opt 127:4736\u20134740","journal-title":"Opt Int J Light Electron Opt"},{"key":"3084_CR19","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1016\/j.engappai.2013.05.008","volume":"26","author":"D Manjarres","year":"2013","unstructured":"Manjarres D, Landa-Torres I, Gil-Lopez S, Del Ser J, Bilbao MN, Salcedo-Sanz S, Geem ZW (2013) A survey on applications of the harmony search algorithm. Eng Appl Artif Intell 26:1818\u20131831","journal-title":"Eng Appl Artif Intell"},{"key":"3084_CR20","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2012) An assessment of features related to phishing websites using an automated technique. In: 2012 international conference for internet technology and secured transactions. IEEE, pp 492\u2013497"},{"key":"3084_CR21","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","volume":"8","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014a) Intelligent rule-based phishing websites classification. IET Inf Secur 8:153\u2013160","journal-title":"IET Inf Secur"},{"key":"3084_CR22","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014b) Predicting phishing websites based on self-structuring neural network. Neural Comput Appl 25:443\u2013458","journal-title":"Neural Comput Appl"},{"key":"3084_CR23","unstructured":"Mohammad R, Thabtah FA, McCluskey T (2015) Phishing websites Dataset"},{"key":"3084_CR24","unstructured":"Montazer GA, ArabYarmohammadi S (2013) Identifying the critical indicators for phishing detection in Iranian e-banking system. In: 2013 5th conference on information and knowledge technology (IKT). IEEE, pp 107\u2013112"},{"key":"3084_CR25","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.neucom.2015.11.051","volume":"179","author":"B Naik","year":"2016","unstructured":"Naik B, Nayak J, Behera HS, Abraham A (2016) A self adaptive harmony search based functional link higher order ANN for non-linear data classification. Neurocomputing 179:69\u201387","journal-title":"Neurocomputing"},{"key":"3084_CR26","doi-asserted-by":"crossref","unstructured":"Pandey M, Ravi V (2012) Detecting phishing e-mails using text and data mining. In: 2012 IEEE international conference on computational intelligence & computing research (ICCIC). IEEE, pp 1\u20136","DOI":"10.1109\/ICCIC.2012.6510259"},{"key":"3084_CR27","first-page":"1","volume":"99","author":"J Qiu","year":"2017","unstructured":"Qiu J, Wei Y, Karimi HR, Gao H (2017a) Reliable control of discrete-time piecewise-affine time-delay systems via output feedback. IEEE Trans Reliab 99:1\u201313","journal-title":"IEEE Trans Reliab"},{"key":"3084_CR28","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/TCSII.2016.2629663","volume":"64","author":"J Qiu","year":"2017","unstructured":"Qiu J, Wei Y, Wu L (2017b) A novel approach to reliable control of piecewise affine systems with actuator faults. IEEE Trans Circuits Syst II Express Briefs 64:957\u2013961","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"3084_CR29","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1016\/j.eswa.2013.09.023","volume":"41","author":"D Rodrigues","year":"2014","unstructured":"Rodrigues D, Pereira LA, Nakamura RY, Costa KA, Yang X-S, Souza AN, Papa JP (2014) A wrapper approach for feature selection based on bat algorithm and optimum-path forest. Expert Syst Appl 41:2250\u20132258","journal-title":"Expert Syst Appl"},{"key":"3084_CR30","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.apm.2011.05.033","volume":"36","author":"SC Satapathy","year":"2012","unstructured":"Satapathy SC, Chittineni S, Krishna SM, Murthy J, Reddy PP (2012) Kalman particle swarm optimized polynomials for data classification. Appl Math Model 36:115\u2013126","journal-title":"Appl Math Model"},{"key":"3084_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.eswa.2017.02.049","volume":"81","author":"Q Song","year":"2017","unstructured":"Song Q, Jiang H, Liu J (2017) Feature selection based on FDA and F-score for multi-class classification. Expert Syst Appl 81:22\u201327","journal-title":"Expert Syst Appl"},{"key":"3084_CR32","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1080\/10556788.2013.834900","volume":"29","author":"L Wang","year":"2014","unstructured":"Wang L, Ni H, Yang R, Pappu V, Fenn MB, Pardalos PM (2014) Feature selection based on meta-heuristics for biomedicine. Optim Methods Softw 29:703\u2013719","journal-title":"Optim Methods Softw"},{"key":"3084_CR33","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s00500-014-1502-7","volume":"20","author":"G-G Wang","year":"2016","unstructured":"Wang G-G, Gandomi AH, Zhao X, Chu HCE (2016) Hybridizing harmony search algorithm with cuckoo search for global numerical optimization. Soft Comput 20:273\u2013285","journal-title":"Soft Comput"},{"key":"3084_CR34","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TCSI.2016.2605685","volume":"64","author":"Y Wei","year":"2017","unstructured":"Wei Y, Qiu J, Karimi HR (2017) Reliable output feedback control of discrete-time fuzzy affine systems with actuator faults. IEEE Trans Circuits Syst I Regul Pap 64:170\u2013181","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"3084_CR35","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75:1947\u20131962","journal-title":"Multimed Tools Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3084-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3084-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3084-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:05:22Z","timestamp":1557147922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3084-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,20]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["3084"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3084-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,20]]},"assertion":[{"value":"20 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}