{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:45:43Z","timestamp":1775187943161,"version":"3.50.1"},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11042-023-15399-6","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T08:02:40Z","timestamp":1682323360000},"page":"44943-44975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Intelligent feature selection model based on particle swarm optimization to detect phishing websites"],"prefix":"10.1007","volume":"82","author":[{"given":"Theyab R.","family":"Alsenani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0970-0455","authenticated-orcid":false,"given":"Safial Islam","family":"Ayon","sequence":"additional","affiliation":[]},{"given":"Sayeda Mayesha","family":"Yousuf","sequence":"additional","affiliation":[]},{"given":"Fahad Bin Kamal","family":"Anik","sequence":"additional","affiliation":[]},{"given":"Mohammad Ehsan Shahmi","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"issue":"1","key":"15399_CR1","first-page":"62","volume":"11","author":"S Abd Manaf","year":"2018","unstructured":"Abd Manaf S, Mustapha N, Sulaiman MN, Husin NA, Shafri HZM, Razali MN (2018) Hybridization of SLIC and extra tree for object based image analysis in extracting shoreline from medium resolution satellite images. Int J Intell Eng Syst 11(1):62\u201372","journal-title":"Int J Intell Eng Syst"},{"issue":"1","key":"15399_CR2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.aci.2014.07.002","volume":"11","author":"N Abdelhamid","year":"2015","unstructured":"Abdelhamid N (2015) Multi-label rules for phishing classification. Appl Comput Inform 11(1):29\u201346","journal-title":"Appl Comput Inform"},{"issue":"13","key":"15399_CR3","doi-asserted-by":"crossref","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamid","year":"2014","unstructured":"Abdelhamid N, Ayesh A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41(13):5948\u20135959","journal-title":"Expert Syst Appl"},{"key":"15399_CR4","doi-asserted-by":"publisher","unstructured":"Abraham A, Guo H, Liu H (2006) Swarm intelligence: foundations, perspectives and applications, in Swarm intelligent systems. Studies in Comput Int, vol 26. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-33869-7_1","DOI":"10.1007\/978-3-540-33869-7_1"},{"key":"15399_CR5","doi-asserted-by":"crossref","unstructured":"Aburrous M, Hossain MA, Dahal K, Thabtah F (2010) Predicting phishing websites using classification mining techniques with experimental case studies. In\u00a02010 Seventh International Conference on Information Technology: New Generations\u00a0(pp. 176\u2013181). IEEE","DOI":"10.1109\/ITNG.2010.117"},{"issue":"12","key":"15399_CR6","doi-asserted-by":"crossref","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","volume":"37","author":"M Aburrous","year":"2010","unstructured":"Aburrous M, Hossain MA, Dahal K, Thabtah F (2010) Intelligent phishing detection system for e-banking using fuzzy data mining. Expert Syst Appl 37(12):7913\u20137921","journal-title":"Expert Syst Appl"},{"key":"15399_CR7","doi-asserted-by":"crossref","unstructured":"Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) RSM analysis based cloud access security broker: a systematic literature review. Clust Comput 25(5):3733\u20133763","DOI":"10.1007\/s10586-022-03598-z"},{"key":"15399_CR8","unstructured":"Ahmed H, Glasgow J (2012) Swarm intelligence: concepts, models and applications. School Of Computing, Queens University Technical Report"},{"issue":"2","key":"15399_CR9","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3233\/ICA-170539","volume":"24","author":"S Ahn","year":"2017","unstructured":"Ahn S, Lee S, Bahn H (2017) A smart elevator scheduler that considers dynamic changes of energy cost and user traffic. Integr Comput-Aided Eng 24(2):187\u2013202","journal-title":"Integr Comput-Aided Eng"},{"key":"15399_CR10","volume":"86","author":"MAH Akhand","year":"2020","unstructured":"Akhand MAH, Ayon SI, Shahriyar SA, Siddique N, Adeli H (2020) Discrete spider monkey optimization for travelling salesman problem. Appl Soft Comput 86:105887","journal-title":"Appl Soft Comput"},{"key":"15399_CR11","doi-asserted-by":"publisher","unstructured":"Akinyelu AA, Adewumi AO (2014) Classification of phishing email using random forest machine learning technique. J Appl Mat. https:\/\/doi.org\/10.1155\/2014\/425731","DOI":"10.1155\/2014\/425731"},{"key":"15399_CR12","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.cose.2017.04.006","volume":"68","author":"A Aleroud","year":"2017","unstructured":"Aleroud A, Zhou L (2017) Phishing environments, techniques, and countermeasures: A survey. Comput Secur 68:160\u2013196","journal-title":"Comput Secur"},{"issue":"2","key":"15399_CR13","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/ICA-160536","volume":"24","author":"A Alexandridis","year":"2017","unstructured":"Alexandridis A, Paizis E, Chondrodima E, Stogiannos M (2017) A particle swarm optimization approach in printed circuit board thermal design. Integr Comput Aided Eng 24(2):143\u2013155","journal-title":"Integr Comput Aided Eng"},{"key":"15399_CR14","doi-asserted-by":"publisher","unstructured":"Ali W (2017) Phishing website detection based on supervised machine learning with wrapper features selection. Int J Adv Comput Sci Appl 8(9). https:\/\/doi.org\/10.14569\/IJACSA.2017.080910","DOI":"10.14569\/IJACSA.2017.080910"},{"issue":"6","key":"15399_CR15","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1049\/iet-ifs.2019.0006","volume":"13","author":"W Ali","year":"2019","unstructured":"Ali W, Ahmed AA (2019) Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf Secur 13(6):659\u2013669","journal-title":"IET Inf Secur"},{"issue":"11","key":"15399_CR16","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1111\/mice.12380","volume":"33","author":"M Alinizzi","year":"2018","unstructured":"Alinizzi M, Chen S, Labi S, Kandil A (2018) A methodology to account for one-way infrastructure interdependency in preservation activity scheduling. Comput Aided Civ Infrastruct Eng 33(11):905\u2013925","journal-title":"Comput Aided Civ Infrastruct Eng"},{"key":"15399_CR17","doi-asserted-by":"crossref","unstructured":"Al-Najjar HA, Kalantar B, Pradhan B, Saeidi V (2019) Conditioning factor determination for mapping and prediction of landslide susceptibility using machine learning algorithms. In\u00a0Earth resources and environmental remote sensing\/GIS applications X\u00a0(Vol. 11156, pp. 97\u2013107). SPIE","DOI":"10.1117\/12.2532687"},{"key":"15399_CR18","doi-asserted-by":"crossref","first-page":"142532","DOI":"10.1109\/ACCESS.2020.3013699","volume":"8","author":"YA Alsariera","year":"2020","unstructured":"Alsariera YA, Adeyemo VE, Balogun AO, Alazzawi AK (2020) Ai meta-learners and extra-trees algorithm for the detection of phishing websites. IEEE Access 8:142532\u2013142542","journal-title":"IEEE Access"},{"issue":"12","key":"15399_CR19","doi-asserted-by":"crossref","first-page":"10459","DOI":"10.1007\/s13369-020-04802-1","volume":"45","author":"YA Alsariera","year":"2020","unstructured":"Alsariera YA, Elijah AV, Balogun AO (2020) Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations. Arab J Sci Eng 45(12):10459\u201310470","journal-title":"Arab J Sci Eng"},{"key":"15399_CR20","doi-asserted-by":"publisher","unstructured":"Altaher A (2017) Phishing websites classification using hybrid SVM and KNN approach. Int J Adv Comput Sci Appl 8(6). https:\/\/doi.org\/10.14569\/IJACSA.2017.080611","DOI":"10.14569\/IJACSA.2017.080611"},{"key":"15399_CR21","unstructured":"Anti-phishing working group. phishing activity trends report. Accessed: September 04, 2021. [Online]. Available: http:\/\/antiphishing.org\/reports\/apwg_report_sep2007_final.pdf"},{"issue":"2","key":"15399_CR22","first-page":"282","volume":"2","author":"MS Arade","year":"2011","unstructured":"Arade MS, Bhaskar PC, Kamat RK (2011) Antiphishing model with url & image based webpage matching. Int J Comput Sci Technol IJCST 2(2):282\u2013286","journal-title":"Int J Comput Sci Technol IJCST"},{"key":"15399_CR23","doi-asserted-by":"crossref","unstructured":"Aydin M, Baykal N (2015) Feature extraction and classification phishing websites based on URL. In\u00a02015 IEEE Conference on Communications and Network Security (CNS)\u00a0(pp. 769\u2013770). IEEE","DOI":"10.1109\/CNS.2015.7346927"},{"key":"15399_CR24","doi-asserted-by":"crossref","unstructured":"Ayon SI, Akhand MAH, Shahriyar SA, Siddique N (2019) Spider monkey optimization to solve traveling salesman problem. In\u00a02019 international conference on electrical, computer and communication engineering (ECCE)\u00a0(pp. 1\u20135). IEEE","DOI":"10.1109\/ECACE.2019.8679221"},{"issue":"12","key":"15399_CR25","doi-asserted-by":"crossref","first-page":"4315","DOI":"10.1007\/s00500-018-3084-2","volume":"23","author":"M Babagoli","year":"2019","unstructured":"Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23(12):4315\u20134327","journal-title":"Soft Comput"},{"issue":"10","key":"15399_CR26","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1111\/mice.12370","volume":"33","author":"SA Bagloee","year":"2018","unstructured":"Bagloee SA, Sarvi M, Patriksson M, Asadi M (2018) Optimization for roads\u2019 construction: selection, prioritization, and scheduling. Comput Aided Civ Infrastruct Eng 33(10):833\u2013848","journal-title":"Comput Aided Civ Infrastruct Eng"},{"issue":"3","key":"15399_CR27","first-page":"1","volume":"3","author":"T Balamuralikrishna","year":"2012","unstructured":"Balamuralikrishna T, Raghavendrasai N, Sukumar MS (2012) Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching. Int J Sci Eng Res 3(3):1\u20136","journal-title":"Int J Sci Eng Res"},{"key":"15399_CR28","doi-asserted-by":"crossref","unstructured":"Balogun AO, Adewole KS, Raheem MO, Akande ON, Usman-Hamza FE, Mabayoje MA, ... & Adeyemo VE (2021) Improving the phishing website detection using empirical analysis of Function Tree and its variants. Heliyon 7(7), e07437","DOI":"10.1016\/j.heliyon.2021.e07437"},{"key":"15399_CR29","doi-asserted-by":"crossref","unstructured":"Basnet RB, Sung AH, Liu Q (2012) Feature selection for improved phishing detection. In\u00a0International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems\u00a0(pp. 252\u2013261). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-31087-4_27"},{"key":"15399_CR30","unstructured":"BlackPhish. Accessed: September 04, 2021. [Online]. Available: http:\/\/tiny.cc\/blackphish."},{"key":"15399_CR31","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-540-74089-6_2","volume-title":"Swarm intelligence","author":"C Blum","year":"2008","unstructured":"Blum C, Li X (2008) Swarm intelligence in optimization. Swarm intelligence. Springer, Berlin, Heidelberg, pp 43\u201385"},{"issue":"1","key":"15399_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/EVCO_r_00180","volume":"25","author":"MR Bonyadi","year":"2017","unstructured":"Bonyadi MR, Michalewicz Z (2017) Particle swarm optimization for single objective continuous space problems: a review. Evol Comput 25(1):1\u201354","journal-title":"Evol Comput"},{"issue":"1","key":"15399_CR33","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"1","key":"15399_CR34","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1017\/S0269888900007724","volume":"11","author":"G Brewka","year":"1996","unstructured":"Brewka G (1996) Artificial intelligence\u2014a modern approach by Stuart Russell and Peter Norvig, Prentice Hall. Series in Artificial Intelligence, Englewood Cliffs, NJ. Knowl Eng Rev 11(1):78\u201379","journal-title":"Knowl Eng Rev"},{"key":"15399_CR35","doi-asserted-by":"crossref","unstructured":"Buber E, Demir \u00d6, Sahingoz OK (2017) Feature selections for the machine learning based detection of phishing websites. In\u00a02017 international artificial intelligence and data processing symposium (IDAP)\u00a0(pp. 1\u20135). Ieee","DOI":"10.1109\/IDAP.2017.8090317"},{"key":"15399_CR36","doi-asserted-by":"crossref","unstructured":"Chang EH, Chiew KL, Tiong WK (2013) Phishing detection via identification of website identity. In\u00a02013 international conference on IT convergence and security (ICITCS)\u00a0(pp. 1\u20134). IEEE","DOI":"10.1109\/ICITCS.2013.6717870"},{"issue":"1","key":"15399_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco D, Jurman G (2020) The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21(1):1\u201313","journal-title":"BMC Genomics"},{"key":"15399_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew KL, Yong KSC, Tan CL (2018) A survey of phishing attacks: Their types, vectors and technical approaches. Expert Syst Appl 106:1\u201320","journal-title":"Expert Syst Appl"},{"key":"15399_CR39","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew KL, Tan CL, Wong K, Yong KS, Tiong WK (2019) A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf Sci 484:153\u2013166","journal-title":"Inf Sci"},{"issue":"1","key":"15399_CR40","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover T, Hart P (1967) Nearest neighbor pattern classification. IEEE Trans Inf Theory 13(1):21\u201327","journal-title":"IEEE Trans Inf Theory"},{"key":"15399_CR41","doi-asserted-by":"crossref","unstructured":"Dhamija R, Tygar JD (2005) The battle against phishing: Dynamic security skins. In\u00a0Proceedings of the 2005 symposium on Usable privacy and security\u00a0(pp. 77\u201388)","DOI":"10.1145\/1073001.1073009"},{"key":"15399_CR42","doi-asserted-by":"crossref","unstructured":"Dong Z, Kapadia A, Blythe J, Camp LJ (2015) Beyond the lock icon: real-time detection of phishing websites using public key certificates. In\u00a02015 APWG Symposium on Electronic Crime Research (eCrime)\u00a0(pp. 1\u201312). IEEE","DOI":"10.1109\/ECRIME.2015.7120795"},{"key":"15399_CR43","doi-asserted-by":"crossref","unstructured":"Fette I, Sadeh N, Tomasic A (2007) Learning to detect phishing emails. In\u00a0Proceedings of the 16th international conference on World Wide Web\u00a0(pp. 649\u2013656)","DOI":"10.1145\/1242572.1242660"},{"issue":"2","key":"15399_CR44","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF02985802","volume":"27","author":"J Franklin","year":"2005","unstructured":"Franklin J (2005) The elements of statistical learning: data mining, inference and prediction. Math Intell 27(2):83\u201385","journal-title":"Math Intell"},{"issue":"4","key":"15399_CR45","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"AY Fu","year":"2006","unstructured":"Fu AY, Wenyin L, Deng X (2006) Detecting phishing web pages with visual similarity assessment based on earth mover\u2019s distance (EMD). IEEE Trans Dependable Secure Comput 3(4):301\u2013311","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"15399_CR46","doi-asserted-by":"crossref","first-page":"404","DOI":"10.3390\/e21040404","volume":"21","author":"W Fu","year":"2019","unstructured":"Fu W, Tan J, Xu Y, Wang K, Chen T (2019) Fault diagnosis for rolling bearings based on fine-sorted dispersion entropy and SVM optimized with mutation SCA-PSO. Entropy 21(4):404","journal-title":"Entropy"},{"issue":"1","key":"15399_CR47","first-page":"1","volume":"5","author":"Y Gao","year":"2015","unstructured":"Gao Y, Du W, Yan G (2015) Selectively-informed particle swarm optimization. Sci Reports 5(1):1\u20137","journal-title":"Sci Reports"},{"issue":"8","key":"15399_CR48","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1111\/mice.12356","volume":"33","author":"JD Garc\u00eda-Nieves","year":"2018","unstructured":"Garc\u00eda-Nieves JD, Ponz-Tienda JL, Salcedo-Bernal A, Pellicer E (2018) The multimode resource-constrained project scheduling problem for repetitive activities in construction projects. Comput Aided Civ Infrastruct Eng 33(8):655\u2013671","journal-title":"Comput Aided Civ Infrastruct Eng"},{"key":"15399_CR49","doi-asserted-by":"crossref","unstructured":"Garera S, Provos N, Chew M, Rubin AD (2007) A framework for detection and measurement of phishing attacks. In\u00a0Proceedings of the 2007 ACM workshop on Recurring malcode\u00a0(pp. 1\u20138)","DOI":"10.1145\/1314389.1314391"},{"key":"15399_CR50","unstructured":"Gini index for decision trees. Accessed: September 04, 2021. [Online]. Available: https:\/\/blog.quantinsti.com\/gini-index\/"},{"key":"15399_CR51","unstructured":"Google. Google Safe Browsing. Accessed: September 04, 2021. [Online]. Available: https:\/\/safebrowsing.google.com\/"},{"key":"15399_CR52","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1016\/j.asoc.2016.08.005","volume":"48","author":"WE Hadi","year":"2016","unstructured":"Hadi WE, Aburub F, Alhawari S (2016) A new fast associative classification algorithm for detecting phishing websites. Appl Soft Comput 48:729\u2013734","journal-title":"Appl Soft Comput"},{"key":"15399_CR53","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.engappai.2015.09.011","volume":"49","author":"G Haixiang","year":"2016","unstructured":"Haixiang G, Yijing L, Yanan L, Xiao L, Jinling L (2016) BPSO-Adaboost-KNN ensemble learning algorithm for multi-class imbalanced data classification. Eng Appl Artif Intell 49:176\u2013193","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"15399_CR54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/23742917.2020.1813396","volume":"5","author":"G Harinahalli Lokesh","year":"2021","unstructured":"Harinahalli Lokesh G, BoreGowda G (2021) Phishing website detection based on effective machine learning approach. J Cyber Secur Technol 5(1):1\u201314","journal-title":"J Cyber Secur Technol"},{"key":"15399_CR55","doi-asserted-by":"crossref","unstructured":"He M, Horng SJ, Fan P, Khan MK, Run RS, Lai JL, ... & Sutanto A (2011) An efficient phishing webpage detector. Expert Syst Appl 38(10):12018\u201312027","DOI":"10.1016\/j.eswa.2011.01.046"},{"issue":"4","key":"15399_CR56","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11235-017-0414-0","volume":"68","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018) Towards detection of phishing websites on client-side using machine learning based approach. Telecommun Syst 68(4):687\u2013700","journal-title":"Telecommun Syst"},{"key":"15399_CR57","doi-asserted-by":"crossref","unstructured":"Kawamura A, Chakraborty B (2017) A hybrid approach for optimal feature subset selection with evolutionary algorithms. In\u00a02017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)\u00a0(pp. 564\u2013568). IEEE","DOI":"10.1109\/ICAwST.2017.8256521"},{"key":"15399_CR58","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In\u00a0Proceedings of ICNN'95-international conference on neural networks\u00a0(Vol. 4, pp. 1942\u20131948). IEEE","DOI":"10.1109\/ICNN.1995.488968"},{"key":"15399_CR59","doi-asserted-by":"crossref","unstructured":"Khonji M, Iraqi Y, Jones A (2011) Lexical URL analysis for discriminating phishing and legitimate e-mail messages. In\u00a02011 International Conference for Internet Technology and Secured Transactions\u00a0(pp. 422\u2013427). IEEE","DOI":"10.1145\/2030376.2030389"},{"key":"15399_CR60","doi-asserted-by":"crossref","unstructured":"Li X, Geng G, Yan Z, Chen Y, Lee X (2016) Phishing detection based on newly registered domains. In\u00a02016 IEEE international conference on big data (big data)\u00a0(pp. 3685\u20133692). IEEE","DOI":"10.1109\/BigData.2016.7841036"},{"issue":"12","key":"15399_CR61","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1111\/mice.12308","volume":"32","author":"TY Liao","year":"2017","unstructured":"Liao TY (2017) On-line vehicle routing problems for carbon emissions reduction. Comput Aided Civ Infrastruct Eng 32(12):1047\u20131063","journal-title":"Comput Aided Civ Infrastruct Eng"},{"key":"15399_CR62","volume":"110","author":"DJ Liu","year":"2021","unstructured":"Liu DJ, Geng GG, Jin XB, Wang W (2021) An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment. Comput Secur 110:102421","journal-title":"Comput Secur"},{"key":"15399_CR63","doi-asserted-by":"crossref","unstructured":"Ma J, Saul LK, Savage S, Voelker GM (2009) Identifying suspicious URLs: an application of large-scale online learning. In\u00a0Proceedings of the 26th annual international conference on machine learning\u00a0(pp. 681\u2013688)","DOI":"10.1145\/1553374.1553462"},{"key":"15399_CR64","doi-asserted-by":"crossref","unstructured":"Maimon OZ, Rokach L (2014) Data mining with decision trees: theory and applications, vol 81. World Scientific,\u00a0Singapore","DOI":"10.1142\/9097"},{"key":"15399_CR65","doi-asserted-by":"crossref","unstructured":"Malkauthekar MD (2013) Analysis of Euclidean distance and Manhattan distance measure in Face recognition. In\u00a0Third International Conference on Computational Intelligence and Information Technology (CIIT 2013)\u00a0(pp. 503\u2013507). IET","DOI":"10.1049\/cp.2013.2636"},{"issue":"4","key":"15399_CR66","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/TNSM.2014.2377295","volume":"11","author":"S Marchal","year":"2014","unstructured":"Marchal S, Fran\u00e7ois J, State R, Engel T (2014) PhishStorm: Detecting phishing with streaming analytics. IEEE Trans Netw Serv Manage 11(4):458\u2013471","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"2","key":"15399_CR67","first-page":"123","volume":"4","author":"JM Merig\u00f3","year":"2011","unstructured":"Merig\u00f3 JM, Casanovas M (2011) A new Minkowski distance based on induced aggregation operators. Int J Comput Intell Syst 4(2):123\u2013133","journal-title":"Int J Comput Intell Syst"},{"key":"15399_CR68","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2012) An assessment of features related to phishing websites using an automated technique. In\u00a02012 international conference for internet technology and secured transactions\u00a0(pp. 492\u2013497). IEEE"},{"issue":"2","key":"15399_CR69","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014) Predicting phishing websites based on self-structuring neural network. Neural Comput Appl 25(2):443\u2013458","journal-title":"Neural Comput Appl"},{"key":"15399_CR70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","volume":"17","author":"RM Mohammad","year":"2015","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2015) Tutorial and critical analysis of phishing websites methods. Comput Sci Rev 17:1\u201324","journal-title":"Comput Sci Rev"},{"issue":"3","key":"15399_CR71","first-page":"294","volume":"3","author":"F Muharemi","year":"2019","unstructured":"Muharemi F, Logof\u0103tu D, Leon F (2019) Machine learning approaches for anomaly detection of water quality on a real-world data set. J Inf Telecommun 3(3):294\u2013307","journal-title":"J Inf Telecommun"},{"key":"15399_CR72","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-319-27247-4_11","volume-title":"AETA 2015: recent advances in electrical engineering and related sciences","author":"HH Nguyen","year":"2016","unstructured":"Nguyen HH, Nguyen DT (2016) Machine learning based phishing web sites detection. AETA 2015: recent advances in electrical engineering and related sciences. Springer, Cham, pp 123\u2013131"},{"key":"15399_CR73","doi-asserted-by":"publisher","unstructured":"Nyo MT, Mebarek-Oudina F, Hlaing SS, Khan NA (2022) Otsu\u2019s thresholding technique for MRI image brain tumor segmentation. Multimed Tools Appl 31(30):43837\u201343849. https:\/\/doi.org\/10.1007\/s11042-022-13215-1","DOI":"10.1007\/s11042-022-13215-1"},{"key":"15399_CR74","doi-asserted-by":"crossref","unstructured":"Pasupuleti S, Battiti R (2006) The gregarious particle swarm optimizer (G-PSO). In\u00a0Proceedings of the 8th annual conference on Genetic and evolutionary computation\u00a0(pp. 67\u201374)","DOI":"10.1145\/1143997.1144007"},{"issue":"3","key":"15399_CR75","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1109\/TNSM.2018.2831197","volume":"15","author":"C Pham","year":"2018","unstructured":"Pham C, Nguyen LA, Tran NH, Huh EN, Hong CS (2018) Phishing-aware: A neuro-fuzzy approach for anti-phishing on fog networks. IEEE Trans Netw Serv Manage 15(3):1076\u20131089","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"15399_CR76","unstructured":"Phishingcorpus. [Online]. Accessed: September 04, 2021. Available: https:\/\/monkey.org\/~jose\/phishing\/"},{"key":"15399_CR77","unstructured":"Phishing websites data set, UCI machine learning repository. Accessed: September 04, 2021. [Online]. Available: https:\/\/archive.ics.uci.edu\/ml\/datasets\/Website+Phishing"},{"key":"15399_CR78","unstructured":"Phishing websites dataset. Accessed: September 04, 2021. [Online]. Available: http:\/\/phishingdatasets.wikispaces.com\/"},{"key":"15399_CR79","unstructured":"PhishTank. Accessed: September 04, 2021. [Online]. Available: http:\/\/www.phishtank.com\/developer"},{"key":"15399_CR80","unstructured":"Phishtank, verified phishing url. Accessed: September 04, 2021. [Online]. Available: https:\/\/www.phishtank.com\/"},{"key":"15399_CR81","doi-asserted-by":"crossref","unstructured":"Priya A, Meenakshi E (2017) Detection of phishing websites using C4. 5 data mining algorithm. In\u00a02017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)\u00a0(pp. 1468\u20131472). IEEE","DOI":"10.1109\/RTEICT.2017.8256841"},{"issue":"1","key":"15399_CR82","first-page":"1934","volume":"20","author":"P Probst","year":"2019","unstructured":"Probst P, Boulesteix AL, Bischl B (2019) Tunability: Importance of hyperparameters of machine learning algorithms. J Mach Learn Res 20(1):1934\u20131965","journal-title":"J Mach Learn Res"},{"key":"15399_CR83","doi-asserted-by":"crossref","unstructured":"Qabajeh I, Thabtah F (2014) An experimental study for assessing email classification attributes using feature selection methods. In\u00a02014 3rd International Conference on Advanced Computer Science Applications and Technologies\u00a0(pp. 125\u2013132). IEEE","DOI":"10.1109\/ACSAT.2014.29"},{"issue":"8","key":"15399_CR84","doi-asserted-by":"crossref","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"RS Rao","year":"2019","unstructured":"Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31(8):3851\u20133873","journal-title":"Neural Comput Appl"},{"issue":"9","key":"15399_CR85","doi-asserted-by":"crossref","first-page":"3853","DOI":"10.1007\/s12652-019-01637-z","volume":"11","author":"RS Rao","year":"2020","unstructured":"Rao RS, Pais AR (2020) Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. J Ambient Intell Humaniz Comput 11(9):3853\u20133872","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"15399_CR86","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1007\/s00521-020-05354-z","volume":"33","author":"RS Rao","year":"2021","unstructured":"Rao RS, Pais AR, Anand P (2021) A heuristic technique to detect phishing websites using TWSVM classifier. Neural Comput Appl 33(11):5733\u20135752","journal-title":"Neural Comput Appl"},{"key":"15399_CR87","doi-asserted-by":"crossref","unstructured":"Roussopoulos N, Kelley S, Vincent F (1995) Nearest neighbor queries. In\u00a0Proceedings of the 1995 ACM SIGMOD international conference on Management of data\u00a0(pp. 71\u201379)","DOI":"10.1145\/568271.223794"},{"issue":"19","key":"15399_CR88","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1093\/bioinformatics\/btm344","volume":"23","author":"Y Saeys","year":"2007","unstructured":"Saeys Y, Inza I, Larranaga P (2007) A review of feature selection techniques in bioinformatics. Bioinformatics 23(19):2507\u20132517","journal-title":"Bioinformatics"},{"key":"15399_CR89","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz OK, Buber E, Demir O, Diri B (2019) Machine learning based phishing detection from URLs. Expert Syst Appl 117:345\u2013357","journal-title":"Expert Syst Appl"},{"key":"15399_CR90","unstructured":"Sarkar S, Roy A, Purkayastha BS (2013) Application of particle swarm optimization in data clustering: A survey. Int J Comput Appl 65(25)"},{"key":"15399_CR91","unstructured":"Sattiraju R, Kochems J, Schotten HD (2019) To Supervise or not-ML based UWB Obstacle Detection. In\u00a0Mobile Communication-Technologies and Applications; 24. ITG-Symposium\u00a0(pp. 1\u20136). VDE"},{"key":"15399_CR92","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.ecolmodel.2019.06.002","volume":"406","author":"P Schratz","year":"2019","unstructured":"Schratz P, Muenchow J, Iturritxa E, Richter J, Brenning A (2019) Hyperparameter tuning and performance assessment of statistical and machine-learning algorithms using spatial data. Ecol Model 406:109\u2013120","journal-title":"Ecol Model"},{"key":"15399_CR93","doi-asserted-by":"crossref","unstructured":"Shabudin S, Sani NS, Ariffin KAZ, Aliff M (2020) Feature selection for phishing website classification. Int J Adv Comput Sci Appl 11(4)","DOI":"10.14569\/IJACSA.2020.0110477"},{"issue":"8","key":"15399_CR94","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1016\/j.future.2011.02.001","volume":"28","author":"H Shahriar","year":"2012","unstructured":"Shahriar H, Zulkernine M (2012) Trustworthiness testing of phishing websites: A behavior model-based approach. Futur Gener Comput Syst 28(8):1258\u20131271","journal-title":"Futur Gener Comput Syst"},{"key":"15399_CR95","doi-asserted-by":"crossref","unstructured":"Sharaff A, Gupta H (2019) Extra-tree classifier with metaheuristics approach for email classification. In\u00a0Advances in computer communication and computational sciences\u00a0(pp. 189\u2013197). Springer, Singapore","DOI":"10.1007\/978-981-13-6861-5_17"},{"issue":"12","key":"15399_CR96","first-page":"310","volume":"6","author":"S Sharma","year":"2017","unstructured":"Sharma S, Sharma S, Athaiya A (2017) Activation functions in neural networks. Towards Data Sci 6(12):310\u2013316","journal-title":"Towards Data Sci"},{"key":"15399_CR97","unstructured":"Shi Y, Eberhart R. A modified particle swarm optimizer,\u2016 in 1998 IEEE International Conference on Evolutionary Computation Proceedings. In\u00a0IEEE World Congress on Computational Intelligence (Cat. No. 98TH8360)\u00a0(pp. 69\u201373)"},{"key":"15399_CR98","doi-asserted-by":"crossref","unstructured":"Shrestha N, Kharel RK, Britt J, Hasan R (2015) High-performance classification of phishing URLs using a multi-modal approach with MapReduce. In\u00a02015 IEEE World congress on services\u00a0(pp. 206\u2013212). IEEE","DOI":"10.1109\/SERVICES.2015.38"},{"key":"15399_CR99","doi-asserted-by":"crossref","unstructured":"Sopto DS, Ayon SI, Akhand MAH, Siddique N (2018) Modified grey wolf optimization to solve traveling salesman problem. In\u00a02018 International Conference on Innovation in Engineering and Technology (ICIET)\u00a0(pp. 1\u20134). IEEE","DOI":"10.1109\/CIET.2018.8660872"},{"key":"15399_CR100","unstructured":"Spam assassin homepage. Accessed: September 04, 2021. [Online]. Available: http:\/\/spamassassin.apache.org\/"},{"key":"15399_CR101","doi-asserted-by":"crossref","unstructured":"Subasi A, Molah E, Almkallawi F, Chaudhery TJ (2017) Intelligent phishing website detection using random forest classifier. In\u00a02017 International conference on electrical and computing technologies and applications (ICECTA)\u00a0(pp. 1\u20135). IEEE","DOI":"10.1109\/ICECTA.2017.8252051"},{"issue":"1","key":"15399_CR102","first-page":"20","volume":"139","author":"V Suganya","year":"2016","unstructured":"Suganya V (2016) A review on phishing attacks and various anti phishing techniques. Int J Comput Appl 139(1):20\u201323","journal-title":"Int J Comput Appl"},{"key":"15399_CR103","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.knosys.2016.03.024","volume":"102","author":"B Sun","year":"2016","unstructured":"Sun B, Chen S, Wang J, Chen H (2016) A robust multi-class AdaBoost algorithm for mislabeled noisy data. Knowl-Based Syst 102:87\u2013102","journal-title":"Knowl-Based Syst"},{"key":"15399_CR104","unstructured":"SURBL. Accessed: September 04, 2021. [Online]. Available: http:\/\/www.surbl.org"},{"issue":"1","key":"15399_CR105","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/BF00130487","volume":"7","author":"MJ Swain","year":"1991","unstructured":"Swain MJ, Ballard DH (1991) Color indexing. Int J Comput Vision 7(1):11\u201332","journal-title":"Int J Comput Vision"},{"key":"15399_CR106","doi-asserted-by":"crossref","unstructured":"Tahir MAUH, Asghar S, Zafar A, Gillani S (2016) A hybrid model to detect phishing-sites using supervised learning algorithms. In\u00a02016 International Conference on Computational Science and Computational Intelligence (CSCI)\u00a0(pp. 1126\u20131133). IEEE","DOI":"10.1109\/CSCI.2016.0214"},{"key":"15399_CR107","unstructured":"Timely. accurate. relevant phishing intelligence. Accessed: September 04, 2021. [Online]. Available: https:\/\/openphish.com\/index.html"},{"issue":"1","key":"15399_CR108","doi-asserted-by":"crossref","first-page":"143","DOI":"10.15388\/20-INFOR404","volume":"31","author":"P Vaitkevicius","year":"2020","unstructured":"Vaitkevicius P, Marcinkevicius V (2020) Comparison of classification algorithms for detection of phishing websites. Informatica 31(1):143\u2013160","journal-title":"Informatica"},{"issue":"06","key":"15399_CR109","doi-asserted-by":"crossref","first-page":"1960008","DOI":"10.1142\/S021821301960008X","volume":"28","author":"G Vrban\u010di\u010d","year":"2019","unstructured":"Vrban\u010di\u010d G, Fister I Jr, Podgorelec V (2019) Parameter setting for deep neural networks using swarm intelligence on phishing websites classification. Int J Artif Intell Tools 28(06):1960008","journal-title":"Int J Artif Intell Tools"},{"key":"15399_CR110","doi-asserted-by":"publisher","unstructured":"Wang W, Zhang F, Luo X, Zhang S (2019) Pdrcnn: precise phishing detection with recurrent convolutional neural networks. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2019\/2595794","DOI":"10.1155\/2019\/2595794"},{"key":"15399_CR111","unstructured":"Weerts HJ, Mueller AC, Vanschoren J (2020) Importance of tuning hyperparameters of machine learning algorithms.\u00a0arXiv preprint arXiv:2007.07588"},{"key":"15399_CR112","unstructured":"Website phishing data set, UCI machine learning repository. Accessed: September 04, 2021. [Online]. Available: https:\/\/archive.ics.uci.edu\/ml\/datasets\/WebsitePhishing"},{"issue":"1","key":"15399_CR113","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: A review. Appl Soft Comput 10(1):1\u201335","journal-title":"Appl Soft Comput"},{"issue":"10","key":"15399_CR114","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1111\/mice.12368","volume":"33","author":"S Xie","year":"2018","unstructured":"Xie S, Lei C, Ouyang Y (2018) A customized hybrid approach to infrastructure maintenance scheduling in railroad networks under variable productivities. Comput Aided Civ Infrastruct Eng 33(10):815\u2013832","journal-title":"Comput Aided Civ Infrastruct Eng"},{"key":"15399_CR115","doi-asserted-by":"crossref","unstructured":"Yerima SY, Alzaylaee MK (2020) High accuracy phishing detection based on convolutional neural networks. In\u00a02020 3rd International Conference on Computer Applications & Information Security (ICCAIS)\u00a0(pp. 1\u20136). IEEE","DOI":"10.1109\/ICCAIS48893.2020.9096869"},{"key":"15399_CR116","doi-asserted-by":"crossref","unstructured":"Yi P, Guan Y, Zou F, Yao Y, Wang W, Zhu T (2018) Web phishing detection using a deep learning framework.\u00a0Wireless Communications and Mobile Computing,\u00a02018","DOI":"10.1155\/2018\/4678746"},{"issue":"1","key":"15399_CR117","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1108\/EL-05-2019-0118","volume":"38","author":"A Zamir","year":"2020","unstructured":"Zamir A, Khan HU, Iqbal T, Yousaf N, Aslam F, Anjum A, Hamdani M (2020) Phishing web site detection using diverse machine learning algorithms. Electron Libr 38(1):65\u201380","journal-title":"Electron Libr"},{"key":"15399_CR118","doi-asserted-by":"crossref","unstructured":"Zhu X (2014) Computational intelligence techniques and applications. In\u00a0Computational intelligence techniques in earth and environmental sciences\u00a0(pp. 3\u201326). Springer, Dordrecht","DOI":"10.1007\/978-94-017-8642-3_1"},{"key":"15399_CR119","doi-asserted-by":"crossref","first-page":"73271","DOI":"10.1109\/ACCESS.2019.2920655","volume":"7","author":"E Zhu","year":"2019","unstructured":"Zhu E, Chen Y, Ye C, Li X, Liu F (2019) OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7:73271\u201373284","journal-title":"IEEE Access"},{"issue":"9","key":"15399_CR120","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1111\/mice.12260","volume":"32","author":"V Zverovich","year":"2017","unstructured":"Zverovich V, Mahdjoubi L, Boguslawski P, Fadli F (2017) Analytic prioritization of indoor routes for search and rescue operations in hazardous environments. Comput Aided Civ Infrastruct Eng 32(9):727\u2013747","journal-title":"Comput Aided Civ Infrastruct Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15399-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15399-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15399-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T02:10:33Z","timestamp":1729303833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15399-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":120,"journal-issue":{"issue":"29","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["15399"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15399-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"20 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Hereby, we consciously assure that for the manuscript \u201cIntelligent Feature Selection Model Based on Particle Swarm Optimization to Detect Phishing Websites\u201d the following is fulfilled: 1) This material is the authors' own original work, which has not been previously published elsewhere. 2) The paper is not currently being considered for publication elsewhere. 3) The paper reflects the authors' own research and analysis in a truthful and complete manner. 4) The paper properly credits the meaningful contributions of co-authors and co-researchers. 5) The results are appropriately placed in the context of prior and existing research. 6) All sources used are properly disclosed (correct citation).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}