{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:02:03Z","timestamp":1773658923215,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s12065-025-01118-7","type":"journal-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T07:57:33Z","timestamp":1765007853000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Probrank: a feature probability estimation-based framework for feature selection and ranking"],"prefix":"10.1007","volume":"19","author":[{"given":"Mahendra","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Mohana Krishna","family":"Arepalli","sequence":"additional","affiliation":[]},{"given":"Penubotu V. Narasimha Nehal","family":"Varma","sequence":"additional","affiliation":[]},{"given":"Godavarthi Maheswara","family":"Pradeep","sequence":"additional","affiliation":[]},{"given":"Chivukula Krishna","family":"Vamsi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"1118_CR1","first-page":"1","volume-title":"2025 6th international conference on recent advances in information technology (RAIT)","author":"M Prasad","year":"2025","unstructured":"Prasad M, Tripathi S, Dahal K (2025) A feature probability estimation-based feature selection approach for intrusion detection. 2025 6th international conference on recent advances in information technology (RAIT). IEEE, pp 1\u20136"},{"issue":"11","key":"1118_CR2","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/s10462-024-10868-2","volume":"57","author":"J Zhu","year":"2024","unstructured":"Zhu J, Zheng J, Zhou Z, Ding Q, Nie F (2024) Self-adjusted graph based semi-supervised embedded feature selection. Artif Intell Rev 57(11):308","journal-title":"Artif Intell Rev"},{"issue":"8","key":"1118_CR3","doi-asserted-by":"publisher","first-page":"10719","DOI":"10.1007\/s13369-022-06760-2","volume":"47","author":"M Prasad","year":"2022","unstructured":"Prasad M, Gupta RK, Tripathi S (2022) A multi-level correlation-based feature selection for intrusion detection. Arab J Sci Eng 47(8):10719\u201310729","journal-title":"Arab J Sci Eng"},{"issue":"2","key":"1118_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-025-01029-7","volume":"18","author":"AK Singh","year":"2025","unstructured":"Singh AK, Kumar A (2025) Hybrid multi-objective particle swarm optimization feature selection approach with firefly algorithm using decision tree classifier. Evol Intel 18(2):45","journal-title":"Evol Intel"},{"issue":"3","key":"1118_CR5","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.1007\/s12065-021-00604-y","volume":"15","author":"NS Reddy","year":"2022","unstructured":"Reddy NS (2022) Optimal feature selection and hybrid deep learning for direct marketing campaigns in banking applications. Evol Intell 15(3):1969\u20131990","journal-title":"Evol Intell"},{"issue":"1","key":"1118_CR6","doi-asserted-by":"publisher","first-page":"6907","DOI":"10.1038\/s41598-025-91282-8","volume":"15","author":"K Natarajan","year":"2025","unstructured":"Natarajan K, Baskaran D, Kamalanathan S (2025) An adaptive ensemble feature selection technique for model-agnostic diabetes prediction. Sci Rep 15(1):6907","journal-title":"Sci Rep"},{"key":"1118_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105980","volume":"87","author":"M Prasad","year":"2020","unstructured":"Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based bayesian and rough set approach for intrusion detection. Appl Soft Comput 87:105980","journal-title":"Appl Soft Comput"},{"issue":"6","key":"1118_CR8","doi-asserted-by":"publisher","first-page":"7169","DOI":"10.1007\/s10489-022-03763-2","volume":"53","author":"M Prasad","year":"2023","unstructured":"Prasad M, Tripathi S, Dahal K (2023) A probability estimation-based feature reduction and bayesian rough set approach for intrusion detection in mobile ad-hoc network. Appl Intell 53(6):7169\u20137185","journal-title":"Appl Intell"},{"key":"1118_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100676","volume":"21","author":"LAC Ahakonye","year":"2023","unstructured":"Ahakonye LAC, Nwakanma CI, Lee JM, Kim DS (2023) Scada intrusion detection scheme exploiting the fusion of modified decision tree and chi-square feature selection. Internet of Things 21:100676","journal-title":"Internet of Things"},{"issue":"1","key":"1118_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13748-023-00298-6","volume":"12","author":"A Alzaqebah","year":"2023","unstructured":"Alzaqebah A, Al-Kadi O, Aljarah I (2023) An enhanced harris hawk optimizer based on extreme learning machine for feature selection. Prog Artif Intell 12(1):77\u201397","journal-title":"Prog Artif Intell"},{"key":"1118_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-024-02362-6","author":"G Li","year":"2024","unstructured":"Li G, Sang B, Cui S, Chen H (2024) Feature correlation fusion and feature selection under adaptive neighborhood group approximation space. Int J Mach Learn Cybern. https:\/\/doi.org\/10.1007\/s13042-024-02362-6","journal-title":"Int J Mach Learn Cybern"},{"key":"1118_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jer.2024.04.008","author":"A Pathak","year":"2024","unstructured":"Pathak A, Barman U, Kumar TS (2024) Machine learning approach to detect android malware using feature-selection based on feature importance score. J Eng Res. https:\/\/doi.org\/10.1016\/j.jer.2024.04.008","journal-title":"J Eng Res"},{"issue":"17\u201318","key":"1118_CR13","first-page":"8154","volume":"54","author":"DS Rani","year":"2024","unstructured":"Rani DS, Rani TS, Bhavani SD, Krishna GB (2024) Feature ranking based consensus clustering for feature subset selection. Appl Intell 54(17\u201318):8154\u20138169","journal-title":"Appl Intell"},{"issue":"2","key":"1118_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s13748-024-00324-1","volume":"13","author":"R Kumar","year":"2024","unstructured":"Kumar R, Anand RS (2024) Bearing fault diagnosis using multiple feature selection algorithms with svm. Prog Artif Intell 13(2):119\u2013133","journal-title":"Prog Artif Intell"},{"key":"1118_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-025-20837-8","author":"MA Bouke","year":"2025","unstructured":"Bouke MA, Abdullah A, Udzir NI, Samian N (2025) Central tendency feature selection (ctfs): a novel approach for efficient and effective feature selection in intrusion detection systems. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-025-20837-8","journal-title":"Multimed Tools Appl"},{"key":"1118_CR16","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.ijrefrig.2023.09.002","volume":"155","author":"A Liang","year":"2023","unstructured":"Liang A, Yunpeng H, Li G (2023) The impact of improved pca method based on anomaly detection on chiller sensor fault detection. Int J Refrig 155:184\u2013194","journal-title":"Int J Refrig"},{"key":"1118_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.tcs.2022.07.030","volume":"931","author":"PR Kannari","year":"2022","unstructured":"Kannari PR, Chowdary NS, Biradar RL (2022) An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. Theor Comput Sci 931:56\u201364","journal-title":"Theor Comput Sci"},{"key":"1118_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-025-00365-0","author":"MA Mosa","year":"2025","unstructured":"Mosa MA (2025) Optimizing text classification accuracy: a hybrid strategy incorporating enhanced nsga-ii and xgboost techniques for feature selection. Prog Artif Intell. https:\/\/doi.org\/10.1007\/s13748-025-00365-0","journal-title":"Prog Artif Intell"},{"key":"1118_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-20458-7","author":"W Zhang","year":"2025","unstructured":"Zhang W, Chen X (2025) Latent low-rank representation guided dual linear regression with different regression matrices for subspace learning. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-20458-7","journal-title":"Multimed Tools Appl"},{"key":"1118_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103808","volume":"89","author":"B Kolukisa","year":"2024","unstructured":"Kolukisa B, Dedeturk BK, Hacilar H, Gungor VC (2024) An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm. Comput Stand Interfaces 89:103808","journal-title":"Comput Stand Interfaces"},{"issue":"35","key":"1118_CR21","doi-asserted-by":"publisher","first-page":"22403","DOI":"10.1007\/s00521-024-10235-w","volume":"36","author":"RK Sachdeva","year":"2024","unstructured":"Sachdeva RK, Bathla P, Rani P, Lamba R, Ghantasala GSP, Nassar IF (2024) A novel k-nearest neighbor classifier for lung cancer disease diagnosis. Neural Comput Appl 36(35):22403\u201322416","journal-title":"Neural Comput Appl"},{"issue":"4","key":"1118_CR22","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.jksuci.2015.12.004","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen IS, Kumar CA (2017) Intrusion detection model using fusion of chi-square feature selection and multi class svm. J King Saud Univ-Comput Inf Sci 29(4):462\u2013472","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"1118_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2023.100423","volume":"25","author":"M Alazab","year":"2024","unstructured":"Alazab M, Khurma RA, Castillo PA, Abu-Salih B, Mart\u00edn A, Camacho D (2024) An effective networks intrusion detection approach based on hybrid harris hawks and multi-layer perceptron. Egypt Inform J 25:100423","journal-title":"Egypt Inform J"},{"key":"1118_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111125","volume":"151","author":"K Pramilarani","year":"2024","unstructured":"Pramilarani K, Kumari PV (2024) Cost based random forest classifier for intrusion detection system in internet of things. Appl Soft Comput 151:111125","journal-title":"Appl Soft Comput"},{"issue":"1","key":"1118_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s44295-024-00046-z","volume":"2","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Zhang F, Casanovas P, Xue B, Zhang M, Symonds JE (2024) A study of feature importance for king salmon health classification with feature selection. Intell Marine Technol Syst 2(1):32","journal-title":"Intell Marine Technol Syst"},{"key":"1118_CR26","unstructured":"Mateen M (2024) Air quality and pollution assessment,"},{"key":"1118_CR27","unstructured":"Hamner B, kenmonta, Cukierski W (2013) Amazon.com - employee access challenge. https:\/\/kaggle.com\/competitions\/amazon-employee-access-challenge. Kaggle"},{"key":"1118_CR28","unstructured":"Wang X, Kr\u00e4ussl Z, Brorsson M (2024) Datasets for advanced bankruptcy prediction: a survey and taxonomy. arXiv preprint arXiv:2411.01928,"},{"key":"1118_CR29","unstructured":"Montoya A (2018) inversion, KirillOdintsov, and Martin Kotek. Home credit default risk. https:\/\/kaggle.com\/competitions\/home-credit-default-risk, Kaggle"},{"key":"1118_CR30","doi-asserted-by":"publisher","unstructured":"Guyon I (2004) Madelon. UCI machine learning repository. https:\/\/doi.org\/10.24432\/C5602H","DOI":"10.24432\/C5602H"},{"key":"1118_CR31","doi-asserted-by":"publisher","unstructured":"Cole R, Fanty M (1991) ISOLET. UCI machine learning repository. https:\/\/doi.org\/10.24432\/C51G69","DOI":"10.24432\/C51G69"},{"key":"1118_CR32","unstructured":"Prasad M (2025) Repository of feature probability estimation (fpe) method. https:\/\/github.com\/mahendrapd\/FPE. GitHub"},{"key":"1118_CR33","unstructured":"Prasad M, Varma PVNN (2025) Fpe library documentation. https:\/\/pvnnehalvarma6984.github.io\/Fpe_Lib.html,"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01118-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-025-01118-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01118-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:04Z","timestamp":1773655684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-025-01118-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1118"],"URL":"https:\/\/doi.org\/10.1007\/s12065-025-01118-7","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"21 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"4"}}