{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:35:25Z","timestamp":1772004925950,"version":"3.50.1"},"reference-count":141,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100013128","name":"Korea Technology and Information Promotion Agency for SMEs","doi-asserted-by":"publisher","award":["No.S3271954"],"award-info":[{"award-number":["No.S3271954"]}],"id":[{"id":"10.13039\/501100013128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["research fund"],"award-info":[{"award-number":["research fund"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Feature selection and hyper-parameters optimization (tuning) are two of the most important and challenging tasks in machine learning. To achieve satisfying performance, every machine learning model has to be adjusted for a specific problem, as the efficient universal approach does not exist. In addition, most of the data sets contain irrelevant and redundant features that can even have a negative influence on the model\u2019s performance. Machine learning can be applied almost everywhere; however, due to the high risks involved with the growing number of malicious, phishing websites on the world wide web, feature selection and tuning are in this research addressed for this particular problem. Notwithstanding that many metaheuristics have been devised for both feature selection and machine learning tuning challenges, there is still much space for improvements. Therefore, the research exhibited in this manuscript tries to improve phishing website detection by tuning extreme learning model that utilizes the most relevant subset of phishing websites data sets features. To accomplish this goal, a novel diversity-oriented social network search algorithm has been developed and incorporated into a two-level cooperative framework. The proposed algorithm has been compared to six other cutting-edge metaheuristics algorithms, that were also implemented in the framework and tested under the same experimental conditions. All metaheuristics have been employed in level 1 of the devised framework to perform the feature selection task. The best-obtained subset of features has then been used as the input to the framework level 2, where all algorithms perform tuning of extreme learning machine. Tuning is referring to the number of neurons in the hidden layers and weights and biases initialization. For evaluation purposes, three phishing websites data sets of different sizes and the number of classes, retrieved from UCI and Kaggle repositories, were employed and all methods are compared in terms of classification error, separately for layers 1 and 2 over several independent runs, and detailed metrics of the final outcomes (output of layer 2), including precision, recall, f1 score, receiver operating characteristics and precision\u2013recall area under the curves. Furthermore, an additional experiment is also conducted, where only layer 2 of the proposed framework is used, to establish metaheuristics performance for extreme machine learning tuning with all features, which represents a large-scale NP-hard global optimization challenge. Finally, according to the results of statistical tests, final research findings suggest that the proposed diversity-oriented social network search metaheuristics on average obtains better achievements than competitors for both challenges and all data sets. Finally, the SHapley Additive exPlanations analysis of the best-performing model was applied to determine the most influential features.<\/jats:p>","DOI":"10.1007\/s40747-023-01118-z","type":"journal-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T02:01:37Z","timestamp":1687917697000},"page":"7269-7304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-924X","authenticated-orcid":false,"given":"Nebojsa","family":"Bacanin","sequence":"first","affiliation":[]},{"given":"Miodrag","family":"Zivkovic","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Antonijevic","sequence":"additional","affiliation":[]},{"given":"K.","family":"Venkatachalam","sequence":"additional","affiliation":[]},{"given":"Jinseok","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yunyoung","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Marjanovic","sequence":"additional","affiliation":[]},{"given":"Ivana","family":"Strumberger","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Abouhawwash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"issue":"7\u20138","key":"1118_CR1","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1080\/0267257X.2013.839571","volume":"30","author":"N Piercy","year":"2014","unstructured":"Piercy N (2014) Online service quality: Content and process of analysis. J Marketing Manag 30(7\u20138):747\u2013785","journal-title":"J Marketing Manag"},{"issue":"3","key":"1118_CR2","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.eswa.2006.06.005","volume":"33","author":"S Lee","year":"2007","unstructured":"Lee S, Lee S, Park Y (2007) A prediction model for success of services in e-commerce using decision tree: E-customer\u2019s attitude towards online service. Expert Syst Appl 33(3):572\u2013581","journal-title":"Expert Syst Appl"},{"issue":"10","key":"1118_CR3","doi-asserted-by":"crossref","first-page":"02690","DOI":"10.1016\/j.heliyon.2019.e02690","volume":"5","author":"P Rita","year":"2019","unstructured":"Rita P, Oliveira T, Farisa A (2019) The impact of e-service quality and customer satisfaction on customer behavior in online shopping. Heliyon 5(10):02690","journal-title":"Heliyon"},{"key":"1118_CR4","doi-asserted-by":"crossref","unstructured":"Westerlund M (2020) Digitalization, internationalization and scaling of online smes. Technology Innovation Management Review 10(4)","DOI":"10.22215\/timreview\/1346"},{"issue":"3","key":"1118_CR5","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1108\/IJEBR-09-2020-0602","volume":"27","author":"A Bressan","year":"2021","unstructured":"Bressan A, Duarte Alonso A, Kok SK (2021) Confronting the unprecedented: micro and small businesses in the age of covid-19. Int J Entrepreneurial Behav Res 27(3):799\u2013820","journal-title":"Int J Entrepreneurial Behav Res"},{"key":"1118_CR6","doi-asserted-by":"crossref","unstructured":"Patel A, Shah N, Ramoliya D, Nayak A (2020) A detailed review of cloud security: issues, threats & attacks. In: 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, pp 758\u2013764","DOI":"10.1109\/ICECA49313.2020.9297572"},{"key":"1118_CR7","doi-asserted-by":"crossref","unstructured":"Khan NA, Brohi SN, Zaman N (2020) Ten deadly cyber security threats amid covid-19 pandemic","DOI":"10.36227\/techrxiv.12278792.v1"},{"key":"1118_CR8","doi-asserted-by":"publisher","unstructured":"Salahdine F, Kaabouch N (2019) Social engineering attacks: A survey. Future Internet 11(4). https:\/\/doi.org\/10.3390\/fi11040089","DOI":"10.3390\/fi11040089"},{"issue":"2","key":"1118_CR9","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/j.jksuci.2023.01.004","volume":"35","author":"A Safi","year":"2023","unstructured":"Safi A, Singh S (2023) A systematic literature review on phishing website detection techniques. J King Saud Univ\u2014Comput Inform Sci 35(2):590\u2013611. https:\/\/doi.org\/10.1016\/j.jksuci.2023.01.004","journal-title":"J King Saud Univ\u2014Comput Inform Sci"},{"key":"1118_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-97436-1","volume-title":"Artificial intelligence for business","author":"R Akerkar","year":"2019","unstructured":"Akerkar R (2019) Artificial intelligence for business. Springer, Cham, Switzerland"},{"key":"1118_CR11","volume-title":"Artificial intelligence in finance","author":"B Buchanan","year":"2019","unstructured":"Buchanan B (2019) Artificial intelligence in finance. The Alan Turing Institute, London, UK"},{"key":"1118_CR12","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.metabol.2017.01.011","volume":"69","author":"P Hamet","year":"2017","unstructured":"Hamet P, Tremblay J (2017) Artificial intelligence in medicine. Metabolism 69:36\u201340","journal-title":"Metabolism"},{"issue":"1","key":"1118_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13073-019-0689-8","volume":"11","author":"R Dias","year":"2019","unstructured":"Dias R, Torkamani A (2019) Artificial intelligence in clinical and genomic diagnostics. Genome Med 11(1):1\u201312","journal-title":"Genome Med"},{"issue":"5","key":"1118_CR14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1049\/iet-net.2020.0078","volume":"9","author":"M Vijayalakshmi","year":"2020","unstructured":"Vijayalakshmi M, Mercy Shalinie S, Yang MH, U RM (2020) Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. Iet Netw 9(5):235\u2013246","journal-title":"Iet Netw"},{"issue":"4","key":"1118_CR15","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1080\/17517575.2021.1896786","volume":"16","author":"AK Jain","year":"2022","unstructured":"Jain AK, Gupta B (2022) A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Inform Syst 16(4):527\u2013565","journal-title":"Enterprise Inform Syst"},{"key":"1118_CR16","doi-asserted-by":"crossref","unstructured":"Fredj OB, Cheikhrouhou O, Krichen M, Hamam H, Derhab A (2021) An owasp top ten driven survey on web application protection methods. In: Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4\u20136, 2020, Revised Selected Papers 15. Springer, pp 235\u2013252","DOI":"10.1007\/978-3-030-68887-5_14"},{"key":"1118_CR17","doi-asserted-by":"crossref","unstructured":"Tanaskovi\u0107 TM, \u017divkovi\u0107 M\u017d (2011) Security principles for web applications. In: 2011 19th Telecommunications Forum (TELFOR) Proceedings of Papers. IEEE, pp 1507\u20131510","DOI":"10.1109\/TELFOR.2011.6143843"},{"issue":"7","key":"1118_CR18","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3390\/info9070149","volume":"9","author":"SS Dhaliwal","year":"2018","unstructured":"Dhaliwal SS, Nahid A-A, Abbas R (2018) Effective intrusion detection system using xgboost. Information 9(7):149","journal-title":"Information"},{"key":"1118_CR19","doi-asserted-by":"crossref","unstructured":"Kanimozhi V, Jacob TP (2019) Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset cse-cic-ids2018 using cloud computing. In: 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE, pp 0033\u20130036","DOI":"10.1109\/ICCSP.2019.8698029"},{"key":"1118_CR20","doi-asserted-by":"crossref","unstructured":"Alqahtani H, Sarker IH, Kalim A, Hossain M, Md S, Ikhlaq S, Hossain S (2020) Cyber intrusion detection using machine learning classification techniques. In: International Conference on Computing Science, Communication and Security. Springer, pp 121\u2013131","DOI":"10.1007\/978-981-15-6648-6_10"},{"key":"1118_CR21","doi-asserted-by":"crossref","first-page":"142532","DOI":"10.1109\/ACCESS.2020.3013699","volume":"8","author":"YA Alsariera","year":"2020","unstructured":"Alsariera YA, Adeyemo VE, Balogun AO, Alazzawi AK (2020) Ai meta-learners and extra-trees algorithm for the detection of phishing websites. IEEE Access 8:142532\u2013142542","journal-title":"IEEE Access"},{"key":"1118_CR22","doi-asserted-by":"crossref","unstructured":"Alam MN, Sarma D, Lima FF, Saha I, Hossain S, et\u00a0al (2020) Phishing attacks detection using machine learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, pp 1173\u20131179","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"issue":"7","key":"1118_CR23","doi-asserted-by":"crossref","first-page":"5019","DOI":"10.1007\/s10462-020-09814-9","volume":"53","author":"T Gangavarapu","year":"2020","unstructured":"Gangavarapu T, Jaidhar C, Chanduka B (2020) Applicability of machine learning in spam and phishing email filtering: review and approaches. Artificial Intell Rev 53(7):5019\u20135081","journal-title":"Artificial Intell Rev"},{"key":"1118_CR24","doi-asserted-by":"crossref","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, pp 29\u201335","DOI":"10.1109\/SPW.2018.00013"},{"key":"1118_CR25","doi-asserted-by":"crossref","unstructured":"Injadat M, Moubayed A, Shami A (2020) Detecting botnet attacks in iot environments: An optimized machine learning approach. In: 2020 32nd International Conference on Microelectronics (ICM). IEEE, pp 1\u20134","DOI":"10.1109\/ICM50269.2020.9331794"},{"issue":"16","key":"1118_CR26","doi-asserted-by":"crossref","first-page":"4372","DOI":"10.3390\/s20164372","volume":"20","author":"YN Soe","year":"2020","unstructured":"Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K (2020) Machine learning-based iot-botnet attack detection with sequential architecture. Sensors 20(16):4372","journal-title":"Sensors"},{"issue":"2","key":"1118_CR27","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1109\/TII.2020.2968927","volume":"17","author":"A Makkar","year":"2020","unstructured":"Makkar A, Garg S, Kumar N, Hossain MS, Ghoneim A, Alrashoud M (2020) An efficient spam detection technique for iot devices using machine learning. IEEE Trans Ind Inform 17(2):903\u2013912","journal-title":"IEEE Trans Ind Inform"},{"issue":"7","key":"1118_CR28","doi-asserted-by":"crossref","first-page":"344","DOI":"10.3390\/info11070344","volume":"11","author":"A Zainab","year":"2020","unstructured":"Zainab A, Refaat S, Bouhali O (2020) Ensemble-based spam detection in smart home iot devices time series data using machine learning techniques. Information 11(7):344","journal-title":"Information"},{"key":"1118_CR29","doi-asserted-by":"crossref","unstructured":"Kumar N, Sonowal S, et\u00a0al (2020) Email spam detection using machine learning algorithms. In: 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, pp 108\u2013113","DOI":"10.1109\/ICIRCA48905.2020.9183098"},{"issue":"6","key":"1118_CR30","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1063\/1.1144830","volume":"65","author":"CM Bishop","year":"1994","unstructured":"Bishop CM (1994) Neural networks and their applications. Rev Sci Instruments 65(6):1803\u20131832","journal-title":"Rev Sci Instruments"},{"key":"1118_CR31","doi-asserted-by":"crossref","unstructured":"Bezdan T, Zivkovic M, Tuba E, Strumberger I, Bacanin N, Tuba M (2020) Glioma brain tumor grade classification from mri using convolutional neural networks designed by modified fa. In: international conference on intelligent and fuzzy systems. Springer, pp 955\u2013963","DOI":"10.1007\/978-3-030-51156-2_111"},{"key":"1118_CR32","doi-asserted-by":"crossref","unstructured":"Bacanin N, Zivkovic M, Jovanovic L, Ivanovic M, Rashid TA (2022) Training a multilayer perception for modeling stock price index predictions using modified whale optimization algorithm. In: Computational Vision and Bio-Inspired Computing. Springer, pp 415\u2013430","DOI":"10.1007\/978-981-16-9573-5_31"},{"key":"1118_CR33","doi-asserted-by":"crossref","unstructured":"Strumberger I, Tuba E, Bacanin N, Jovanovic R, Tuba M (2019) Convolutional neural network architecture design by the tree growth algorithm framework. In: 2019 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8851755"},{"issue":"3","key":"1118_CR34","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3390\/a13030067","volume":"13","author":"N Bacanin","year":"2020","unstructured":"Bacanin N, Bezdan T, Tuba E, Strumberger I, Tuba M (2020) Optimizing convolutional neural network hyperparameters by enhanced swarm intelligence metaheuristics. Algorithms 13(3):67","journal-title":"Algorithms"},{"key":"1118_CR35","doi-asserted-by":"crossref","unstructured":"Strumberger I, Tuba E, Bacanin N, Zivkovic M, Beko M, Tuba M (2019) Designing convolutional neural network architecture by the firefly algorithm. In: 2019 International Young Engineers Forum (YEF-ECE). IEEE, pp 59\u201365","DOI":"10.1109\/YEF-ECE.2019.8740818"},{"issue":"1\u20133","key":"1118_CR36","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1\u20133):489\u2013501","journal-title":"Neurocomputing"},{"issue":"1","key":"1118_CR37","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert DH, Macready WG (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67\u201382","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"1118_CR38","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/s40747-020-00212-w","volume":"7","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Lu J, Jin Y (2021) Artificial intelligence in recommender systems. Complex Intell Syst 7(1):439\u2013457","journal-title":"Complex Intell Syst"},{"key":"1118_CR39","doi-asserted-by":"crossref","unstructured":"Bacanin N, Tuba E, Zivkovic M, Strumberger I, Tuba M (2019) Whale optimization algorithm with exploratory move for wireless sensor networks localization. In: International conference on hybrid intelligent systems. Springer, pp 328\u2013338","DOI":"10.1007\/978-3-030-49336-3_33"},{"key":"1118_CR40","doi-asserted-by":"crossref","unstructured":"Abdel-Basset M, Abdel-Fatah L, Sangaiah AK (2018) Metaheuristic algorithms: A comprehensive review. Computational intelligence for multimedia big data on the cloud with engineering applications 185\u2013231","DOI":"10.1016\/B978-0-12-813314-9.00010-4"},{"key":"1118_CR41","doi-asserted-by":"crossref","first-page":"92815","DOI":"10.1109\/ACCESS.2021.3091495","volume":"9","author":"S Talatahari","year":"2021","unstructured":"Talatahari S, Bayzidi H, Saraee M (2021) Social network search for global optimization. IEEE Access 9:92815\u201392863","journal-title":"IEEE Access"},{"key":"1118_CR42","doi-asserted-by":"crossref","unstructured":"Do NQ, Selamat A, Krejcar O, Herrera-Viedma E, Fujita H (2022) Deep learning for phishing detection: Taxonomy, current challenges and future directions. IEEE Access","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"1118_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/1862888","volume":"2022","author":"N Ahmed","year":"2022","unstructured":"Ahmed N, Amin R, Aldabbas H, Koundal D, Alouffi B, Shah T (2022) Machine learning techniques for spam detection in email and iot platforms: analysis and research challenges. Secur Commun Netw 2022:1\u201319","journal-title":"Secur Commun Netw"},{"key":"1118_CR44","doi-asserted-by":"crossref","first-page":"115742","DOI":"10.1016\/j.eswa.2021.115742","volume":"186","author":"S Rao","year":"2021","unstructured":"Rao S, Verma AK, Bhatia T (2021) A review on social spam detection: challenges, open issues, and future directions. Expert Syst Appl 186:115742","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1118_CR45","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar G, Sahin F (2014) A survey on feature selection methods. Comput Electr Eng 40(1):16\u201328","journal-title":"Comput Electr Eng"},{"key":"1118_CR46","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1109\/TPAMI.1979.4766926","volume":"3","author":"GV Trunk","year":"1979","unstructured":"Trunk GV (1979) A problem of dimensionality: a simple example. IEEE Trans Pattern Anal Mach Intell 3:306\u2013307","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"66\u201371","key":"1118_CR47","first-page":"13","volume":"10","author":"L Van Der Maaten","year":"2009","unstructured":"Van Der Maaten L, Postma E, Van den Herik J et al (2009) Dimensionality reduction: a comparative. J Mach Learn Res 10(66\u201371):13","journal-title":"J Mach Learn Res"},{"issue":"8","key":"1118_CR48","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1109\/PROC.1969.7277","volume":"57","author":"MD Levine","year":"1969","unstructured":"Levine MD (1969) Feature extraction: a survey. Proc IEEE 57(8):1391\u20131407","journal-title":"Proc IEEE"},{"issue":"1","key":"1118_CR49","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1093\/bib\/bbab354","volume":"23","author":"A Bommert","year":"2022","unstructured":"Bommert A, Welchowski T, Schmid M, Rahnenf\u00fchrer J (2022) Benchmark of filter methods for feature selection in high-dimensional gene expression survival data. Briefings Bioinform 23(1):354","journal-title":"Briefings Bioinform"},{"key":"1118_CR50","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. In: 2004 IEEE international joint conference on neural networks (IEEE Cat. No. 04CH37541), vol 2. Ieee, pp 985\u2013990"},{"key":"1118_CR51","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.asoc.2016.03.019","volume":"44","author":"AS Alencar","year":"2016","unstructured":"Alencar AS, Neto ARR, Gomes JPP (2016) A new pruning method for extreme learning machines via genetic algorithms. Appl Soft Comput 44:101\u2013107","journal-title":"Appl Soft Comput"},{"issue":"1","key":"1118_CR52","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TNN.2009.2036259","volume":"21","author":"Y Miche","year":"2009","unstructured":"Miche Y, Sorjamaa A, Bas P, Simula O, Jutten C, Lendasse A (2009) Op-elm: optimally pruned extreme learning machine. IEEE Trans Neural Netw 21(1):158\u2013162","journal-title":"IEEE Trans Neural Netw"},{"issue":"10","key":"1118_CR53","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1016\/j.patcog.2005.03.028","volume":"38","author":"Q-Y Zhu","year":"2005","unstructured":"Zhu Q-Y, Qin AK, Suganthan PN, Huang G-B (2005) Evolutionary extreme learning machine. Pattern Recognit 38(10):1759\u20131763","journal-title":"Pattern Recognit"},{"key":"1118_CR54","doi-asserted-by":"crossref","unstructured":"Blum C, Li X (2008) Swarm intelligence in optimization. In: Swarm Intelligence. Springer, Berlin, Heidelberg, pp 43\u201385","DOI":"10.1007\/978-3-540-74089-6_2"},{"key":"1118_CR55","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s12065-013-0102-2","volume":"7","author":"X-S Yang","year":"2014","unstructured":"Yang X-S (2014) Swarm intelligence based algorithms: a critical analysis. Evol Intell 7:17\u201328","journal-title":"Evol Intell"},{"key":"1118_CR56","volume-title":"Evolutionary and swarm intelligence algorithms","author":"JC Bansal","year":"2019","unstructured":"Bansal JC, Singh PK, Pal NR et al (2019) Evolutionary and swarm intelligence algorithms, vol 779. Springer, Cham, Switzerland"},{"key":"1118_CR57","doi-asserted-by":"crossref","first-page":"5923","DOI":"10.1007\/s00500-017-2810-5","volume":"22","author":"X-S Yang","year":"2018","unstructured":"Yang X-S, Deb S, Zhao Y-X, Fong S, He X (2018) Swarm intelligence: past, present and future. Soft Comput 22:5923\u20135933","journal-title":"Soft Comput"},{"issue":"3","key":"1118_CR58","doi-asserted-by":"crossref","first-page":"46","DOI":"10.25007\/ajnu.v6n3a78","volume":"6","author":"SM Abdulrahman","year":"2017","unstructured":"Abdulrahman SM (2017) Using swarm intelligence for solving np-hard problems. Acad J Nawroz Univ 6(3):46\u201350","journal-title":"Acad J Nawroz Univ"},{"key":"1118_CR59","doi-asserted-by":"crossref","unstructured":"Tkatek S, Bahti O, Lmzouari Y, Abouchabaka J (2020) Artificial intelligence for improving the optimization of np-hard problems: a review. Int J Adv Trends Comput Sci Appl 9(5)","DOI":"10.30534\/ijatcse\/2020\/73952020"},{"key":"1118_CR60","unstructured":"Pang W, Wang K-p, Zhou C-g, Dong L-j (2004) Fuzzy discrete particle swarm optimization for solving traveling salesman problem. In: The fourth international conference on computer and information technology, 2004. CIT\u201904. IEEE pp 796\u2013800"},{"issue":"3","key":"1118_CR61","doi-asserted-by":"crossref","first-page":"6915","DOI":"10.4249\/scholarpedia.6915","volume":"5","author":"D Karaboga","year":"2010","unstructured":"Karaboga D (2010) Artificial bee colony algorithm. Scholarpedia 5(3):6915","journal-title":"Scholarpedia"},{"key":"1118_CR62","doi-asserted-by":"crossref","first-page":"169135","DOI":"10.1109\/ACCESS.2021.3135201","volume":"9","author":"N Bacanin","year":"2021","unstructured":"Bacanin N, Bezdan T, Venkatachalam K, Zivkovic M, Strumberger I, Abouhawwash M, Ahmed AB (2021) Artificial neural networks hidden unit and weight connection optimization by quasi-refection-based learning artificial bee colony algorithm. IEEE Access 9:169135\u2013169155","journal-title":"IEEE Access"},{"key":"1118_CR63","doi-asserted-by":"crossref","unstructured":"Cuk A, Bezdan T, Bacanin N, Zivkovic M, Venkatachalam K, Rashid TA, Devi VK (2021) Feedforward multi-layer perceptron training by hybridized method between genetic algorithm and artificial bee colony. Data Sci Data Anal 279","DOI":"10.1201\/9781003111290-17-21"},{"issue":"6","key":"1118_CR64","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.12785\/amis\/080619","volume":"8","author":"M Tuba","year":"2014","unstructured":"Tuba M, Bacanin N (2014) Artificial bee colony algorithm hybridized with firefly algorithm for cardinality constrained mean-variance portfolio selection problem. Appl Math Inform Sci 8(6):2831","journal-title":"Appl Math Inform Sci"},{"key":"1118_CR65","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"issue":"22","key":"1118_CR66","doi-asserted-by":"crossref","first-page":"4893","DOI":"10.3390\/app9224893","volume":"9","author":"I Strumberger","year":"2019","unstructured":"Strumberger I, Bacanin N, Tuba M, Tuba E (2019) Resource scheduling in cloud computing based on a hybridized whale optimization algorithm. Appl Sci 9(22):4893","journal-title":"Appl Sci"},{"key":"1118_CR67","doi-asserted-by":"crossref","unstructured":"Strumberger I, Bezdan T, Ivanovic M, Jovanovic L (2021) Improving energy usage in wireless sensor networks by whale optimization algorithm. In: 2021 29th Telecommunications Forum (TELFOR). IEEE, pp 1\u20134","DOI":"10.1109\/TELFOR52709.2021.9653282"},{"key":"1118_CR68","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"1118_CR69","doi-asserted-by":"crossref","unstructured":"Bacanin N, Bezdan T, Tuba E, Strumberger I, Tuba M, Zivkovic M (2019) Task scheduling in cloud computing environment by grey wolf optimizer. In: 2019 27th telecommunications forum (TELFOR). IEEE, pp 1\u20134","DOI":"10.1109\/TELFOR48224.2019.8971223"},{"key":"1118_CR70","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Bacanin N, Zivkovic T, Strumberger I, Tuba E, Tuba M (2020) Enhanced grey wolf algorithm for energy efficient wireless sensor networks. In: 2020 Zooming Innovation in Consumer Technologies Conference (ZINC). IEEE, pp 87\u201392","DOI":"10.1109\/ZINC50678.2020.9161788"},{"key":"1118_CR71","doi-asserted-by":"crossref","unstructured":"Mohammed HM, Abdul ZK, Rashid TA, Alsadoon A, Bacanin N (2021) A new k-means gray wolf algorithm for engineering problems. World J Eng","DOI":"10.1108\/WJE-10-2020-0527"},{"key":"1118_CR72","doi-asserted-by":"crossref","unstructured":"Yang X-S (2009) Firefly algorithms for multimodal optimization. In: International Symposium on Stochastic Algorithms. Springer, pp 169\u2013178","DOI":"10.1007\/978-3-642-04944-6_14"},{"issue":"13","key":"1118_CR73","doi-asserted-by":"crossref","first-page":"2272","DOI":"10.3390\/math10132272","volume":"10","author":"D Jovanovic","year":"2022","unstructured":"Jovanovic D, Antonijevic M, Stankovic M, Zivkovic M, Tanaskovic M, Bacanin N (2022) Tuning machine learning models using a group search firefly algorithm for credit card fraud detection. Mathematics 10(13):2272","journal-title":"Mathematics"},{"key":"1118_CR74","doi-asserted-by":"crossref","first-page":"956","DOI":"10.7717\/peerj-cs.956","volume":"8","author":"M Zivkovic","year":"2022","unstructured":"Zivkovic M, Tair M, Venkatachalam K, Bacanin N, Hub\u00e1lovsk\u1ef3 \u0160, Trojovsk\u1ef3 P (2022) Novel hybrid firefly algorithm: an application to enhance xgboost tuning for intrusion detection classification. PeerJ Comput Sci 8:956","journal-title":"PeerJ Comput Sci"},{"key":"1118_CR75","first-page":"959","volume":"72","author":"M Tair","year":"2022","unstructured":"Tair M, Bacanin N, Zivkovic M, Venkatachalam K (2022) A chaotic oppositional whale optimisation algorithm with firefly search for medical diagnostics. Comput. Mater. Contin 72:959\u2013982","journal-title":"Comput. Mater. Contin"},{"issue":"21","key":"1118_CR76","doi-asserted-by":"crossref","first-page":"2705","DOI":"10.3390\/math9212705","volume":"9","author":"N Bacanin","year":"2021","unstructured":"Bacanin N, Stoean R, Zivkovic M, Petrovic A, Rashid TA, Bezdan T (2021) Performance of a novel chaotic firefly algorithm with enhanced exploration for tackling global optimization problems: Application for dropout regularization. Mathematics 9(21):2705","journal-title":"Mathematics"},{"key":"1118_CR77","doi-asserted-by":"crossref","unstructured":"Bezdan T, Cvetnic D, Gajic L, Zivkovic M, Strumberger I, Bacanin N (2021) Feature selection by firefly algorithm with improved initialization strategy. In: 7th Conference on the Engineering of Computer Based Systems, pp 1\u20138","DOI":"10.1145\/3459960.3459974"},{"key":"1118_CR78","doi-asserted-by":"crossref","unstructured":"Bacanin N, Zivkovic M, Sarac M, Petrovic A, Strumberger I, Antonijevic M, Petrovic A, Venkatachalam K (2022) A novel multiswarm firefly algorithm: An application for plant classification. In: International Conference on Intelligent and Fuzzy Systems. Springer, pp 1007\u20131016","DOI":"10.1007\/978-3-031-09173-5_115"},{"key":"1118_CR79","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S (2016) Sca: a sine cosine algorithm for solving optimization problems. Knowledge-Based Syst 96:120\u2013133","journal-title":"Knowledge-Based Syst"},{"key":"1118_CR80","doi-asserted-by":"publisher","unstructured":"AlHosni N, Jovanovic L, Antonijevic M, Bukumira M, Zivkovic M, Strumberger I, Mani JP, Bacanin N (2022) The XGBoost model for network intrusion detection boosted by enhanced sine cosine algorithm. In: Third International conference on image processing and capsule networks. Springer, pp 213\u2013228. https:\/\/doi.org\/10.1007\/978-3-031-12413-6_17","DOI":"10.1007\/978-3-031-12413-6_17"},{"key":"1118_CR81","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Jovanovic L, Ivanovic M, Krdzic A, Bacanin N, Strumberger I (2022) Feature selection using modified sine cosine algorithm with covid-19 dataset. In: Evolutionary computing and mobile sustainable networks. Springer, pp 15\u201331","DOI":"10.1007\/978-981-16-9605-3_2"},{"key":"1118_CR82","doi-asserted-by":"crossref","unstructured":"Bacanin N, Zivkovic M, Salb M, Strumberger I, Chhabra A (2022) Convolutional neural networks hyperparameters optimization using sine cosine algorithm. In: Sentimental Analysis and Deep Learning. Springer, pp 863\u2013878","DOI":"10.1007\/978-981-16-5157-1_67"},{"key":"1118_CR83","doi-asserted-by":"crossref","first-page":"113609","DOI":"10.1016\/j.cma.2020.113609","volume":"376","author":"L Abualigah","year":"2021","unstructured":"Abualigah L, Diabat A, Mirjalili S, Abd Elaziz M, Gandomi AH (2021) The arithmetic optimization algorithm. Comput Methods Appl Mech Eng 376:113609","journal-title":"Comput Methods Appl Mech Eng"},{"key":"1118_CR84","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Stoean C, Petrovic A, Bacanin N, Strumberger I, Zivkovic T (2021) A novel method for covid-19 pandemic information fake news detection based on the arithmetic optimization algorithm. In: 2021 23rd international symposium on symbolic and numeric algorithms for scientific computing (SYNASC). IEEE, pp 259\u2013266","DOI":"10.1109\/SYNASC54541.2021.00051"},{"key":"1118_CR85","doi-asserted-by":"crossref","first-page":"114287","DOI":"10.1016\/j.compstruct.2021.114287","volume":"273","author":"S Khatir","year":"2021","unstructured":"Khatir S, Tiachacht S, Le Thanh C, Ghandourah E, Mirjalili S, Wahab MA (2021) An improved artificial neural network using arithmetic optimization algorithm for damage assessment in fgm composite plates. Composite Struct 273:114287","journal-title":"Composite Struct"},{"key":"1118_CR86","doi-asserted-by":"crossref","unstructured":"Kaveh A, Hamedani KB (2022) Improved arithmetic optimization algorithm and its application to discrete structural optimization. In: Structures, vol 35. Elsevier, pp 748\u2013764","DOI":"10.1016\/j.istruc.2021.11.012"},{"key":"1118_CR87","doi-asserted-by":"publisher","unstructured":"Bacanin N, Petrovic A, Antonijevic M, Zivkovic M, Sarac M, Tuba E, Strumberger I (2023) Intrusion detection by\u00a0XGBoost model tuned by\u00a0improved social network search algorithm. In: Modelling and Development of Intelligent Systems. Springer, pp 104\u2013121. https:\/\/doi.org\/10.1007\/978-3-031-27034-5_7","DOI":"10.1007\/978-3-031-27034-5_7"},{"issue":"3","key":"1118_CR88","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.cad.2010.12.015","volume":"43","author":"RV Rao","year":"2011","unstructured":"Rao RV, Savsani VJ, Vakharia D (2011) Teaching-learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput-aided Design 43(3):303\u2013315","journal-title":"Comput-aided Design"},{"issue":"13","key":"1118_CR89","doi-asserted-by":"crossref","first-page":"19153","DOI":"10.1016\/j.ceramint.2021.03.262","volume":"47","author":"V Srinivasan","year":"2021","unstructured":"Srinivasan V, Palani P, Balamurugan S (2021) Experimental investigation on edm of si3n4-tin using grey relational analysis coupled with teaching-learning-based optimization algorithm. Ceramics Int 47(13):19153\u201319168","journal-title":"Ceramics Int"},{"key":"1118_CR90","doi-asserted-by":"crossref","first-page":"101665","DOI":"10.1109\/ACCESS.2021.3097985","volume":"9","author":"MS Alanazi","year":"2021","unstructured":"Alanazi MS (2021) A modified teaching-learning-based optimization for dynamic economic load dispatch considering both wind power and load demand uncertainties with operational constraints. IEEE Access 9:101665\u2013101680","journal-title":"IEEE Access"},{"key":"1118_CR91","doi-asserted-by":"crossref","first-page":"104282","DOI":"10.1016\/j.engappai.2021.104282","volume":"102","author":"T Dokeroglu","year":"2021","unstructured":"Dokeroglu T, Sevinc E (2021) Memetic teaching-learning-based optimization algorithms for large graph coloring problems. Eng Appl Artificial Intell 102:104282","journal-title":"Eng Appl Artificial Intell"},{"key":"1118_CR92","doi-asserted-by":"crossref","unstructured":"Kashan AH (2009) League championship algorithm: a new algorithm for numerical function optimization. In: 2009 International conference of soft computing and pattern recognition. IEEE, pp 43\u201348","DOI":"10.1109\/SoCPaR.2009.21"},{"issue":"1","key":"1118_CR93","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s10845-015-1099-4","volume":"29","author":"W Xu","year":"2018","unstructured":"Xu W, Wang R, Yang J (2018) An improved league championship algorithm with free search and its application on production scheduling. J Intell Manuf 29(1):165\u2013174","journal-title":"J Intell Manuf"},{"key":"1118_CR94","unstructured":"Abdulhamid SM, Latiff MSA, Idris I (2015) Tasks scheduling technique using league championship algorithm for makespan minimization in iaas cloud. arXiv preprint arXiv:1510.03173"},{"key":"1118_CR95","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/j.asoc.2018.03.051","volume":"68","author":"MR Alimoradi","year":"2018","unstructured":"Alimoradi MR, Kashan AH (2018) A league championship algorithm equipped with network structure and backward q-learning for extracting stock trading rules. Appl Soft Comput 68:478\u2013493","journal-title":"Appl Soft Comput"},{"key":"1118_CR96","doi-asserted-by":"crossref","first-page":"102669","DOI":"10.1016\/j.scs.2020.102669","volume":"66","author":"M Zivkovic","year":"2021","unstructured":"Zivkovic M, Bacanin N, Venkatachalam K, Nayyar A, Djordjevic A, Strumberger I, Al-Turjman F (2021) Covid-19 cases prediction by using hybrid machine learning and beetle antennae search approach. Sustain Cities Soc 66:102669","journal-title":"Sustain Cities Soc"},{"key":"1118_CR97","doi-asserted-by":"crossref","unstructured":"Bezdan T, Zivkovic M, Bacanin N, Chhabra A, Suresh M (2022) Feature selection by hybrid brain storm optimization algorithm for covid-19 classification. Journal of Computational Biology","DOI":"10.1089\/cmb.2021.0256"},{"key":"1118_CR98","doi-asserted-by":"crossref","unstructured":"Budimirovic N, Prabhu E, Antonijevic M, Zivkovic M, Bacanin N, Strumberger I, Venkatachalam K (2022) Covid-19 severity prediction using enhanced whale with salp swarm feature classification. Computers, Materials and Continua 1685\u20131698","DOI":"10.32604\/cmc.2022.023418"},{"key":"1118_CR99","doi-asserted-by":"crossref","unstructured":"Strumberger I, Rakic A, Stanojlovic S, Arandjelovic J, Bezdan T, Zivkovic M, Bacanin N (2021) Feature selection by hybrid binary ant lion optimizer with covid-19 dataset. In: 2021 29th telecommunications forum (TELFOR). IEEE, pp 1\u20134","DOI":"10.1109\/TELFOR52709.2021.9653256"},{"key":"1118_CR100","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Petrovic A, Bacanin N, Milosevic S, Veljic V, Vesic A (2022) The covid-19 images classification by mobilenetv3 and enhanced sine cosine metaheuristics. In: Mobile computing and sustainable informatics. Springer, pp 937\u2013950","DOI":"10.1007\/978-981-19-2069-1_65"},{"key":"1118_CR101","doi-asserted-by":"crossref","unstructured":"Bezdan T, Milosevic S, Venkatachalam K, Zivkovic M, Bacanin N, Strumberger I (2021) Optimizing convolutional neural network by hybridized elephant herding optimization algorithm for magnetic resonance image classification of glioma brain tumor grade. In: 2021 Zooming Innovation in Consumer Technologies Conference (ZINC). IEEE, pp 171\u2013176","DOI":"10.1109\/ZINC52049.2021.9499297"},{"key":"1118_CR102","doi-asserted-by":"crossref","unstructured":"Salb M, Zivkovic M, Bacanin N, Chhabra A, Suresh M (2022) Support vector machine performance improvements for cryptocurrency value forecasting by enhanced sine cosine algorithm. In: Computer vision and robotics. Springer, pp 527\u2013536","DOI":"10.1007\/978-981-16-8225-4_40"},{"key":"1118_CR103","doi-asserted-by":"crossref","unstructured":"AlHosni N, Jovanovic L, Antonijevic M, Bukumira M, Zivkovic M, Strumberger I, Mani JP, Bacanin N (2022) The xgboost model for network intrusion detection boosted by enhanced sine cosine algorithm. In: International Conference on Image Processing and Capsule Networks. Springer, pp 213\u2013228","DOI":"10.1007\/978-3-031-12413-6_17"},{"key":"1118_CR104","doi-asserted-by":"crossref","unstructured":"Tair M, Bacanin N, Zivkovic M, Venkatachalam K, Strumberger I (2022) Xgboost design by multi-verse optimiser: An application for network intrusion detection. In: Mobile Computing and Sustainable Informatics. Springer, pp 1\u201316","DOI":"10.1007\/978-981-19-2069-1_1"},{"key":"1118_CR105","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Bacanin N, Arandjelovic J, Rakic A, Strumberger I, Venkatachalam K, Joseph PM (2022) Novel harris hawks optimization and deep neural network approach for intrusion detection. In: Proceedings of International Joint Conference on Advances in Computational Intelligence. Springer, pp 239\u2013250","DOI":"10.1007\/978-981-19-0332-8_17"},{"issue":"11","key":"1118_CR106","doi-asserted-by":"crossref","first-page":"4204","DOI":"10.3390\/s22114204","volume":"22","author":"N Bacanin","year":"2022","unstructured":"Bacanin N, Stoean C, Zivkovic M, Jovanovic D, Antonijevic M, Mladenovic D (2022) Multi-swarm algorithm for extreme learning machine optimization. Sensors 22(11):4204","journal-title":"Sensors"},{"key":"1118_CR107","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Vesic A, Bacanin N, Strumberger I, Antonijevic M, Jovanovic L, Marjanovic M (2022) An improved animal migration optimization approach for extreme learning machine tuning. In: International Conference on Intelligent and Fuzzy Systems. Springer, pp 3\u201313","DOI":"10.1007\/978-3-031-09176-6_1"},{"issue":"8","key":"1118_CR108","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1007\/s13042-017-0642-3","volume":"9","author":"AK Alshamiri","year":"2018","unstructured":"Alshamiri AK, Singh A, Surampudi BR (2018) Two swarm intelligence approaches for tuning extreme learning machine. Int J Mach Learn Cybernet 9(8):1271\u20131283","journal-title":"Int J Mach Learn Cybernet"},{"issue":"2","key":"1118_CR109","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1007\/s40747-020-00237-1","volume":"7","author":"R Guha","year":"2021","unstructured":"Guha R, Ghosh M, Singh PK, Sarkar R, Nasipuri M (2021) A hybrid swarm and gravitation-based feature selection algorithm for handwritten indic script classification problem. Complex Intell Syst 7(2):823\u2013839","journal-title":"Complex Intell Syst"},{"key":"1118_CR110","doi-asserted-by":"crossref","unstructured":"Jain R, Joseph T, Saxena A, Gupta D, Khanna A, Sagar K, Ahlawat AK (2021) Feature selection algorithm for usability engineering: a nature inspired approach. Complex & Intelligent Systems 1\u201311","DOI":"10.1007\/s40747-021-00384-z"},{"issue":"12","key":"1118_CR111","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3390\/machines9120341","volume":"9","author":"B Alkan","year":"2021","unstructured":"Alkan B, Kaniappan Chinnathai M (2021) Performance comparison of recent population-based metaheuristic optimisation algorithms in mechanical design problems of machinery components. Machines 9(12):341","journal-title":"Machines"},{"issue":"15","key":"1118_CR112","first-page":"100273","volume":"10","author":"PJ Gnetchejo","year":"2022","unstructured":"Gnetchejo PJ, Essiane SN, Dadj\u00e9 A, Wapet DM, Ele P (2022) Optimal design of the modelling parameters of photovoltaic modules and array through metaheuristic with secant method. Energy Conv Manag 10(15):100273","journal-title":"Energy Conv Manag"},{"issue":"1","key":"1118_CR113","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1504\/IJSI.2013.055801","volume":"1","author":"X-S Yang","year":"2013","unstructured":"Yang X-S, Xingshi H (2013) Firefly algorithm: Recent advances and applications. Int J Swarm Intell 1(1):36\u201350","journal-title":"Int J Swarm Intell"},{"key":"1118_CR114","doi-asserted-by":"publisher","unstructured":"Rahnamayan S, Tizhoosh HR, Salama MMA (2007) Quasi-oppositional differential evolution. In: 2007 IEEE Congress on Evolutionary Computation, pp 2229\u20132236. https:\/\/doi.org\/10.1109\/CEC.2007.4424748","DOI":"10.1109\/CEC.2007.4424748"},{"key":"1118_CR115","doi-asserted-by":"crossref","unstructured":"Cheng S, Shi Y (2011) Diversity control in particle swarm optimization. In: 2011 IEEE Symposium on Swarm Intelligence. IEEE, pp 1\u20139","DOI":"10.1109\/SIS.2011.5952581"},{"key":"1118_CR116","doi-asserted-by":"crossref","unstructured":"Miche Y, Sorjamaa A, Lendasse A (2008) Op-elm: theory, experiments and a toolbox. In: International Conference on Artificial Neural Networks. Springer, pp 145\u2013154","DOI":"10.1007\/978-3-540-87536-9_16"},{"key":"1118_CR117","doi-asserted-by":"crossref","unstructured":"Mohd Yusof N, Muda AK, Pratama SF, Abraham A (2022) A novel nonlinear time-varying sigmoid transfer function in binary whale optimization algorithm for descriptors selection in drug classification. Molecular Diversity 1\u201310","DOI":"10.1007\/s11030-022-10410-y"},{"issue":"5","key":"1118_CR118","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1007\/s12559-021-09933-7","volume":"13","author":"J Wang","year":"2021","unstructured":"Wang J, Khishe M, Kaveh M, Mohammadi H (2021) Binary chimp optimization algorithm (bchoa): A new binary meta-heuristic for solving optimization problems. Cognit Comput 13(5):1297\u20131316","journal-title":"Cognit Comput"},{"key":"1118_CR119","doi-asserted-by":"crossref","first-page":"14239","DOI":"10.1109\/ACCESS.2021.3052149","volume":"9","author":"Y Hassouneh","year":"2021","unstructured":"Hassouneh Y, Turabieh H, Thaher T, Tumar I, Chantar H, Too J (2021) Boosted whale optimization algorithm with natural selection operators for software fault prediction. IEEE Access 9:14239\u201314258","journal-title":"IEEE Access"},{"key":"1118_CR120","doi-asserted-by":"crossref","unstructured":"Abdollahzadeh B, Gharehchopogh FS (2021) A multi-objective optimization algorithm for feature selection problems. Engineering with Computers 1\u201319","DOI":"10.1007\/s00366-021-01369-9"},{"key":"1118_CR121","unstructured":"Tan CL (2018) Phishing dataset for machine learning: Feature evaluation. Mendeley Data 1:2018"},{"key":"1118_CR122","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2015) Phishing websites features. University of Huddersfield, School of Computing and Engineering"},{"issue":"3","key":"1118_CR123","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","volume":"8","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014) Intelligent rule-based phishing websites classification. IET Inform Secur 8(3):153\u2013160","journal-title":"IET Inform Secur"},{"issue":"2","key":"1118_CR124","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014) Predicting phishing websites based on self-structuring neural network. Neural Comput Appl 25(2):443\u2013458","journal-title":"Neural Comput Appl"},{"key":"1118_CR125","unstructured":"Dua D, Graff C (2017) UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"issue":"13","key":"1118_CR126","doi-asserted-by":"crossref","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamid","year":"2014","unstructured":"Abdelhamid N, Ayesh A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41(13):5948\u20135959","journal-title":"Expert Syst Appl"},{"issue":"5","key":"1118_CR127","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1504\/IJBIC.2011.042259","volume":"3","author":"X-S Yang","year":"2011","unstructured":"Yang X-S (2011) Bat algorithm for multi-objective optimisation. Int J io-Inspired Comput 3(5):267\u2013274","journal-title":"Int J io-Inspired Comput"},{"key":"1118_CR128","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: Algorithm and applications. Future Generation Comput Syst 97:849\u2013872","journal-title":"Future Generation Comput Syst"},{"key":"1118_CR129","unstructured":"Eftimov T, Koro\u0161ec P, Seljak BK (2016) Disadvantages of statistical comparison of stochastic optimization algorithms. Proceedings of the Bioinspired Optimizaiton Methods and their Applications, BIOMA, 105\u2013118"},{"key":"1118_CR130","doi-asserted-by":"crossref","unstructured":"Derrac J, Garc\u00eda S, Molina D, Herrera F (2011) A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput 1(1):3\u201318","DOI":"10.1016\/j.swevo.2011.02.002"},{"key":"1118_CR131","doi-asserted-by":"crossref","unstructured":"Garc\u00eda S, Molina D, Lozano M, Herrera F (2009) A study on the use of non-parametric tests for analyzing the evolutionary algorithms\u2019 behaviour: a case study on the cec\u20192005 special session on real parameter optimization. J Heuristics 15(6):617\u2013644","DOI":"10.1007\/s10732-008-9080-4"},{"key":"1118_CR132","doi-asserted-by":"crossref","unstructured":"Shapiro SS, Francia R (1972) An approximate analysis of variance test for normality. J Am Stat Assoc 67(337):215\u2013216","DOI":"10.1080\/01621459.1972.10481232"},{"key":"1118_CR133","doi-asserted-by":"crossref","first-page":"100973","DOI":"10.1016\/j.swevo.2021.100973","volume":"67","author":"A LaTorre","year":"2021","unstructured":"LaTorre A, Molina D, Osaba E, Poyatos J, Del Ser J, Herrera F (2021) A prescription of methodological guidelines for comparing bio-inspired optimization algorithms. Swarm Evol Comput 67:100973","journal-title":"Swarm Evol Comput"},{"issue":"3","key":"1118_CR134","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3102\/00028312003003187","volume":"3","author":"GV Glass","year":"1966","unstructured":"Glass GV (1966) Testing homogeneity of variances. Am Educ Res J 3(3):187\u2013190","journal-title":"Am Educ Res J"},{"issue":"200","key":"1118_CR135","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman M (1937) The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J Am Stat Assoc 32(200):675\u2013701","journal-title":"J Am Stat Assoc"},{"key":"1118_CR136","doi-asserted-by":"crossref","unstructured":"Friedman M (1940) A comparison of alternative tests of significance for the problem of m rankings. Ann Math Stat 11(1):86\u201392","DOI":"10.1214\/aoms\/1177731944"},{"key":"1118_CR137","doi-asserted-by":"crossref","DOI":"10.1201\/9780429186196","volume-title":"Handbook of parametric and nonparametric statistical procedures","author":"DJ Sheskin","year":"2020","unstructured":"Sheskin DJ (2020) Handbook of parametric and nonparametric statistical procedures. Chapman and Hall\/CRC, Boca Raton, Florida"},{"issue":"6","key":"1118_CR138","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1080\/03610928008827904","volume":"9","author":"RL Iman","year":"1980","unstructured":"Iman RL, Davenport JM (1980) Approximations of the critical region of the fbietkan statistic. Commun Satistics-Theory Methods 9(6):571\u2013595","journal-title":"Commun Satistics-Theory Methods"},{"key":"1118_CR139","unstructured":"Lundberg SM, Lee S-I (2017) A unified approach to interpreting model predictions. Advances in neural information processing systems 30"},{"issue":"1","key":"1118_CR140","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/s42256-019-0138-9","volume":"2","author":"SM Lundberg","year":"2020","unstructured":"Lundberg SM, Erion G, Chen H, DeGrave A, Prutkin JM, Nair B, Katz R, Himmelfarb J, Bansal N, Lee S-I (2020) From local explanations to global understanding with explainable ai for trees. Nat Mach Intell 2(1):56\u201367","journal-title":"Nat Mach Intell"},{"key":"1118_CR141","doi-asserted-by":"crossref","unstructured":"Pratiwi M, Lorosae T, Wibowo F (2018) Phishing site detection analysis using artificial neural network. In: Journal of Physics: Conference Series, vol 1140. IOP Publishing, p 012048","DOI":"10.1088\/1742-6596\/1140\/1\/012048"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01118-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01118-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01118-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T19:05:24Z","timestamp":1698433524000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01118-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,28]]},"references-count":141,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1118"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01118-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,28]]},"assertion":[{"value":"16 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}