{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:17:22Z","timestamp":1761808642584},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Oper. Res. Forum"],"DOI":"10.1007\/s43069-023-00272-x","type":"journal-article","created":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T10:02:43Z","timestamp":1702980163000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Development of a Heuristic Based Mixed Integer Linear Programming Model for Resources Allocation During Cyberfraud Mitigation"],"prefix":"10.1007","volume":"5","author":[{"given":"Oluwatoyin Esther","family":"Akinbowale","sequence":"first","affiliation":[]},{"given":"Polly","family":"Mashigo","sequence":"additional","affiliation":[]},{"given":"Mulatu Fekadu","family":"Zerihun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,19]]},"reference":[{"issue":"1","key":"272_CR1","first-page":"390","volume":"15","author":"M Uma","year":"2013","unstructured":"Uma M, Padmavathi G (2013) A survey on various cyber-attacks and their classification. Int J Netw Secur 15(1):390\u2013396","journal-title":"Int J Netw Secur"},{"issue":"4","key":"272_CR2","first-page":"46","volume":"6","author":"S Tiwari","year":"2016","unstructured":"Tiwari S, Bhalla A, Rawat R (2016) Cybercrime and security. Int Adv Res Comput Sci Softw Eng 6(4):46\u201352","journal-title":"Int Adv Res Comput Sci Softw Eng"},{"key":"272_CR3","unstructured":"Detica Limited (2011) The cost of cybercrime. United Kingdom. 1\u201332"},{"issue":"3","key":"272_CR4","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1108\/JFC-04-2021-0086","volume":"29","author":"OE Akinbowale","year":"2022","unstructured":"Akinbowale OE, Klingelh\u00f6fer HE, Zerihun MF (2022) Analytical hierarchy process decision model and pareto analysis for mitigating cybercrime in the financial sector. J Financ Crime 29(3):884\u20131008","journal-title":"J Financ Crime"},{"issue":"5","key":"272_CR5","first-page":"997","volume":"3","author":"EH Dalla","year":"2013","unstructured":"Dalla EH, Geeta MS (2013) Cybercrime a threat to persons, property, government and societies. Int J Adv Res Comput Sci Softw Eng 3(5):997\u20131002","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"issue":"6","key":"272_CR6","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.clsr.2009.09.005","volume":"25","author":"P Hunton","year":"2009","unstructured":"Hunton P (2009) The growing phenomenon of crime and the internet: a cybercrime execution and analysis model. Comput Law Secur Rev 25(6):528\u2013535","journal-title":"Comput Law Secur Rev"},{"key":"272_CR7","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199290987.001.0001","volume-title":"Computer crimes and digital investigations","author":"I Walden","year":"2007","unstructured":"Walden I (2007) Computer crimes and digital investigations. Oxford University Press, Inc, UK"},{"issue":"9","key":"272_CR8","first-page":"98","volume":"3","author":"FB Okeshola","year":"2013","unstructured":"Okeshola FB, Adeta AK (2013) The nature causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna State, Nigeria. Am Int J Contemp Res 3(9):98\u2013114","journal-title":"Am Int J Contemp Res"},{"issue":"4","key":"272_CR9","first-page":"1","volume":"6","author":"SS Monni","year":"2016","unstructured":"Monni SS, Sultana A (2016) Investigating cyber bullying: pervasiveness, causes and socio-psychological impact on adolescent girls. J Public Adm Gov 6(4):1\u201326","journal-title":"J Public Adm Gov"},{"key":"272_CR10","unstructured":"Meephlam P (2017) Challenges in internet fraud prosecution and investigation in Thailand: The Perspective of Thai police officers. A Dissertation Submitted in Partial Fulfilment of Master of Science in Criminology and Criminal Justice, Durham University, pp. 1\u2013100"},{"issue":"3","key":"272_CR11","first-page":"85","volume":"17","author":"H Saleh","year":"2017","unstructured":"Saleh H, Rezk A, Barakat S (2017) The impact of cyber crime on E-Commerce. Int J Intell Comput Inf Sci 17(3):85\u201396","journal-title":"Int J Intell Comput Inf Sci"},{"issue":"1","key":"272_CR12","doi-asserted-by":"crossref","first-page":"148","DOI":"10.29121\/granthaalayah.v7.i1.2019.1043","volume":"7","author":"HS Rao","year":"2019","unstructured":"Rao HS (2019) Cyber crime in banking sector. Int J Res Granthaalayah 7(1):148\u2013161","journal-title":"Int J Res Granthaalayah"},{"issue":"4087","key":"272_CR13","first-page":"1","volume":"12","author":"R Ch","year":"2020","unstructured":"Ch R, Gadekallu TR, Abidi MH, Al-Ahmari A (2020) Computational system to classify cyber crime offenses using machine learning. Sustainability 12(4087):1\u201316","journal-title":"Sustainability"},{"key":"272_CR14","doi-asserted-by":"crossref","unstructured":"Saddiq, S. A., & Bakar, A. S. A. 2019. Impact Of Economic And Financial Crimes On Economic Growth In Emerging And Developing Countries A Systematic Review. Journal of Financial Crime, vol. 26, no. 3, pp. 910-920.","DOI":"10.1108\/JFC-10-2018-0112"},{"key":"272_CR15","unstructured":"Hong LC (2022) The cost of cybercrime vs the cost of cybersecurity. Available [Online] at https:\/\/www.sangfor.com\/blog\/cybersecurity\/cost-of-cybercrime-vs-cost-of-cybersecurity#:~:text=Cybercrime%20is%20estimated%20to%20cost,in%202021%20than%20in%202015. [Accessed 23 Jan 2023]"},{"key":"272_CR16","unstructured":"Council for Scientific and Industrial Research Report (2023) Cybercrime cost the economy an estimated R2.2 billion Rands per annum. Available [Online] at\u00a0https:\/\/ewn.co.za\/2023\/04\/05\/csir-cybercrime-costs-the-economy-an-estimated-r2-2bn-per-annum#:~:text=According%20to%20cybersecurity%20experts%2C%20more,ransomware%20over%20the%20past%20year.&text=CAPE%20TOWN%20%2D%20The%20Council%20for,2%20billion%20rand%20per%20annum. [Accessed 3 May 2023]"},{"issue":"7","key":"272_CR17","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.im.2009.06.005","volume":"46","author":"S Goel","year":"2009","unstructured":"Goel S, Shawky HA (2009) Estimating the market impact of security breach announcements on the firm values. Inf Manag 46(7):404\u2013410","journal-title":"Inf Manag"},{"issue":"8","key":"272_CR18","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.cose.2011.07.003","volume":"30","author":"N Martin","year":"2011","unstructured":"Martin N, Rice J (2011) Cybercrime: understanding and addressing the concerns of stakeholders. Comput Secur 30(8):803\u2013814","journal-title":"Comput Secur"},{"issue":"2","key":"272_CR19","first-page":"202","volume":"2","author":"H Saini","year":"2012","unstructured":"Saini H, Rao YS, Panda TC (2012) Cyber-crimes and their impacts: a review. Int J Eng Res Appl 2(2):202\u2013209","journal-title":"Int J Eng Res Appl"},{"issue":"3","key":"272_CR20","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.techfore.2012.07.002","volume":"80","author":"E Kraemer-Mbula","year":"2013","unstructured":"Kraemer-Mbula E, Tang P, Rush H (2013) The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Chang 80(3):541\u2013555","journal-title":"Technol Forecast Soc Chang"},{"key":"272_CR21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","volume":"45","author":"M Lagazio","year":"2014","unstructured":"Lagazio M, Sherif N, Cushman M (2014) A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput Secur 45:58\u201374","journal-title":"Comput Secur"},{"key":"272_CR22","unstructured":"Dlamini, Z., & Modise, M. 2012. Cyber security awareness initiatives in South Africa: a synergy approach. 7th International Conference on Information Warfare and Security, Seattle, USA. pp. 1-10."},{"issue":"4","key":"272_CR23","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1108\/JFC-04-2020-0053","volume":"27","author":"OE Akinbowale","year":"2020","unstructured":"Akinbowale OE, Klingelh\u00f6fer HE, Zerihun MF (2020) An innovative approach in combating economic crime using forensic accounting techniques. J Financ Crime 27(4):1253\u20131271","journal-title":"J Financ Crime"},{"key":"272_CR24","doi-asserted-by":"crossref","unstructured":"Akinbowale OE,\u00a0Mashigo P, Zerihun MF (2023b) The integration of forensic accounting and big data technology frameworks for internal fraud mitigation in the banking industry. Cogent Bus Manag\u00a010(1):2163560,\u00a0pp. 1\u201322","DOI":"10.1080\/23311975.2022.2163560"},{"key":"272_CR25","unstructured":"Murthy, P. R., 2007. \u201cOperation Research\u201d (2nd edn.). New Age Publisher, New Delhi, India. pp. 1-716."},{"key":"272_CR26","unstructured":"Daniel L (2022) Cyber fraud is reaching new highs in SA \u2013 and it\u2019s the apps on your phone putting you at risk. Available [Online] at\u00a0https:\/\/www.news24.com\/news24\/bi-archive\/mobile-app-cyber-fraud-in-south-africa-2022-6. [Accessed 3 May 2023]"},{"key":"272_CR27","unstructured":"LexisNexis Fraud Multiplier report (2022) The cost of fraud significantly increases as cybercriminals diversify. Available [Online] at https:\/\/risk.lexisnexis.com\/global\/en\/insights-resources\/research\/emea-true-cost-of-fraud-study. [Accessed 3 May 2023]"},{"issue":"1675404","key":"272_CR28","first-page":"1","volume":"5","author":"S Dlamini","year":"2019","unstructured":"Dlamini S, Mbambo C (2019) Understanding policing of cybercrime in South Africa: the phenomena, challenges and effective responses. Cogent Soc Sci 5(1675404):1\u201313","journal-title":"Cogent Soc Sci"},{"issue":"1","key":"272_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4102\/sajems.v21i1.2455","volume":"21","author":"J Coetzee","year":"2018","unstructured":"Coetzee J (2018) Strategic implications of Fintech on South African retail banks. S Afr J Econ Manag Sci 21(1):1\u201311","journal-title":"S Afr J Econ Manag Sci"},{"key":"272_CR30","volume-title":"Digital banking security, risk and credibility concerns in South Africa","author":"R Dagada","year":"2013","unstructured":"Dagada R (2013) Digital banking security, risk and credibility concerns in South Africa. The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), Kuala Lumpur, Malaysia, 4-6 Mar 2013"},{"key":"272_CR31","doi-asserted-by":"crossref","unstructured":"Herselman, M. & Warren, M., 2004. Cyber Crime Influencing Businesses in South Africa. Issues in Informing Science and Information Technology, vol. 1, pp. 253-266.","DOI":"10.28945\/736"},{"key":"272_CR32","doi-asserted-by":"crossref","unstructured":"Mbelli, T. M. And Dwolatzky, B., 2016. Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security. 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing, pp. 1-6.","DOI":"10.1109\/CSCloud.2016.18"},{"key":"272_CR33","unstructured":"Sutherland, E., 2017. Governance of Cybersecurity \u2013 The Case of South Africa. The African Journal of Information and Communication, vol. 20, pp. 83-112."},{"issue":"2153412","key":"272_CR34","first-page":"1","volume":"11","author":"OE Akinbowale","year":"2023","unstructured":"Akinbowale OE, Klingelh\u00f6fer HE, Zerihun MF (2023) Application of forensic accounting techniques in the South African banking industry for the purpose of fraud risk mitigation. Cogent Econ Finance 11(2153412):1\u201321","journal-title":"Cogent Econ Finance"},{"key":"272_CR35","unstructured":"Barclays Africa Group Ltd. (2017) Integrated report. Available at https:\/\/www.barclaysafrica.com\/content\/dam\/barclays-africa\/bagl\/pdf\/results\/annual\/2017-integrated-report.pdf. [Accessed 16 Nov 2021]"},{"key":"272_CR36","unstructured":"Standard Bank Group Ltd. (2021) Annual integrated report [Online] Available at https:\/\/www.standardbank.com\/sbg\/standard-bank-group\/whats-happening\/financials\/annual-integrated-report. [Accessed 26 Dec 2022]"},{"key":"272_CR37","unstructured":"FirstRand Group Ltd. (2022) Annual integrated report [Online]. Available at https:\/\/www.firstrand.co.za\/media\/investors\/annual-reporting\/firstrand-annual-integrated-report-2022.pdf. [Accessed 26 Dec 2022]"},{"key":"272_CR38","unstructured":"Nedbank Group Ltd. (2021) Integrated annual report. Available [Online] at https:\/\/www.nedbank.co.za\/content\/dam\/nedbank\/site-assets\/AboutUs\/Information%20Hub\/Integrated%20Report\/2022\/2021%20Nedbank%20Group%20Integrated%20Report%20(1A).pdf. [Accessed 26 Dec 2022]"},{"key":"272_CR39","unstructured":"Capitec Bank Ltd. (2022) Integrated annual report. Available at https:\/\/www.capitecbank.co.za\/globalassets\/pages\/investor-relations\/financial-results\/2022\/annual-report\/integrated_annual_report_2022.pdf. [Accessed 26 Dec 2022]"},{"key":"272_CR40","unstructured":"Security Focus Africa Report (2022) The cost of fraud significantly increases as cybercriminals diversify. Available [Online] https:\/\/www.securityfocusafrica.com\/2022\/08\/29\/true-cost-of-fraud-soars-as-cybercriminals-diversify\/. [Accessed 3 May 2023]"},{"key":"272_CR41","first-page":"64","volume":"20","author":"S Balan","year":"2017","unstructured":"Balan S, Otto J, Minasian E, Aryal A (2017) Data analysis of cybercrimes in businesses. Inf Technol Manag Sci 20:64\u201368","journal-title":"Inf Technol Manag Sci"},{"issue":"13","key":"272_CR42","doi-asserted-by":"crossref","first-page":"3503","DOI":"10.1080\/00207540701824233","volume":"47","author":"A Certa","year":"2009","unstructured":"Certa A, Enea M, Galante G, La Fata CM (2009) Multi-objective human resources allocation in R & D projects planning. Int J Prod Res 47(13):3503\u20133523","journal-title":"Int J Prod Res"},{"issue":"3","key":"272_CR43","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1016\/j.ifacol.2015.06.164","volume":"48","author":"L En-nahli","year":"2015","unstructured":"En-nahli L, Allaoui H, Nouaouri I (2015) Multi-objective modelling to human resource assignment and routing problem for home health care services. IFAC-Papers OnLine 48(3):698\u2013670","journal-title":"IFAC-Papers OnLine"},{"key":"272_CR44","first-page":"895","volume":"70","author":"A \u00c9les","year":"2018","unstructured":"\u00c9les A, Cabezas H, Heckl I (2018) Heuristic algorithm utilizing mixed-integer linear programming to schedule mobile workforce. Chem Eng Trans 70:895\u2013900","journal-title":"Chem Eng Trans"},{"key":"272_CR45","doi-asserted-by":"crossref","first-page":"60547","DOI":"10.1109\/ACCESS.2018.2875122","volume":"6","author":"J Geng","year":"2018","unstructured":"Geng J, Ying S, Jia X, Zhang T, Liu X, Guo L, Xuan J (2018) Supporting many objective software requirements decision: an exploratory study on the next release problem. IEEE Access 6:60547\u201360558","journal-title":"IEEE Access"},{"issue":"3","key":"272_CR46","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s12065-019-00237-2","volume":"12","author":"A Amaral","year":"2019","unstructured":"Amaral A, Elias G (2019) A risk-driven multi-objective evolutionary approach for selecting software requirements. Evol Intell 12(3):421\u2013444","journal-title":"Evol Intell"},{"issue":"106825","key":"272_CR47","first-page":"1","volume":"147","author":"S Dong","year":"2022","unstructured":"Dong S, Xue Y, Brinkkemper S, Li Y-F (2022) Multi-objective integer programming approaches to next release problem \u2014 enhancing exact methods for finding whole Pareto front. Inf Softw Technol 147(106825):1\u201314","journal-title":"Inf Softw Technol"},{"key":"272_CR48","doi-asserted-by":"publisher","unstructured":"Akinbowale OE,\u00a0Klingelh\u00f6fer HE, Zerihun MF (2023a) Development of a multi-objectives integer programming model for allocation of anti-fraud capacities during cyberfraud mitigation. J Financ Crime\u00a01\u201316. https:\/\/doi.org\/10.1108\/JFC-10-2022-0245","DOI":"10.1108\/JFC-10-2022-0245"},{"key":"272_CR49","doi-asserted-by":"crossref","unstructured":"Zhang Y, Harman M, Mansouri SA (2007) The multi-objective next release problem. In: Proceedings of GECCO 2007: genetic and evolutionary computation conference. 1129\u20131137","DOI":"10.1145\/1276958.1277179"},{"key":"272_CR50","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.infsof.2017.03.001","volume":"87","author":"AM Pitangueira","year":"2017","unstructured":"Pitangueira AM, Tonella P, Susi A, Maciel R, Barros M (2017) Minimizing the stakeholder dissatisfaction risk in requirement selection for next release planning. Inf Softw Technol 87:104\u2013118","journal-title":"Inf Softw Technol"},{"key":"272_CR51","doi-asserted-by":"crossref","unstructured":"Pitangueira AM, Tonella P, Susi A, Maciel R, Barros M (2016) Risk-aware multistakeholder next release planning using multi-objective optimization. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 9619:3\u201318. Springer, Verlag","DOI":"10.1007\/978-3-319-30282-9_1"},{"key":"272_CR52","first-page":"1","volume":"9","author":"T Laisupannawong","year":"2021","unstructured":"Laisupannawong T, Intiyot B, Jeenanunta C (2021) Mixed-integer linear programming model and heuristic for short-term scheduling of pressing process in multi-layer printed circuit board manufacturing. Mathematics 9:1\u201325","journal-title":"Mathematics"},{"issue":"55","key":"272_CR53","first-page":"1","volume":"6","author":"A Mahmoodi","year":"2022","unstructured":"Mahmoodi A, Hashemi L, Lalibert\u00e9 J, Millar RC (2022) Secured multi-dimensional robust optimization model for remotely piloted aircraft system (RPAS) delivery network based on the SORA standard. Designs 6(55):1\u201319","journal-title":"Designs"},{"key":"272_CR54","doi-asserted-by":"crossref","unstructured":"Doole, M., Ellerbroek, J. & Hoekstra, J. (2020). Estimayion of Traffic Density from Drone-based Delivery in very Low Level Urban Airspace. Journal of Air Transport Management, vol. 88 (101862), pp. 1-11.","DOI":"10.1016\/j.jairtraman.2020.101862"},{"issue":"1","key":"272_CR55","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/AJEB-11-2021-0131","volume":"7","author":"A Mahmoodi","year":"2023","unstructured":"Mahmoodi A, Hashemi L, Jasemi M, Laliberte J, Millar RC, Noshadi H (2023) A novel approach for candlestick technical analysis using a combination of the support vector machine and particle swarm optimization. Asian J Econ Bank 7(1):2\u201324","journal-title":"Asian J Econ Bank"},{"key":"272_CR56","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s12597-022-00608-x","volume":"60","author":"A Mahmoodi","year":"2023","unstructured":"Mahmoodi A, Hashemi L, Jasemi M, Mehraban S, Laliberte J, Millar RC (2023) A developed stock price forecasting model using support vector machine combined with metaheuristic algorithms. Opsearch 60:59\u201386","journal-title":"Opsearch"},{"key":"272_CR57","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.tre.2019.01.005","volume":"122","author":"L Bertazzi","year":"2019","unstructured":"Bertazzi L, Coelho LC, Maio De, Lagana A (2019) A matheuristic algorithm for the multi-depot inventory routing problem. Transport Res E Logist Transport Rev 122:524\u2013544","journal-title":"Transport Res E Logist Transport Rev"},{"key":"272_CR58","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1111\/poms.13105","volume":"29","author":"D Li","year":"2020","unstructured":"Li D, Ding L, Connor S (2020) When to switch? Index policies for resource scheduling in emergency response. Prod Oper Manag 29:241\u2013262","journal-title":"Prod Oper Manag"},{"key":"272_CR59","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1111\/poms.12993","volume":"28","author":"KS Jung","year":"2019","unstructured":"Jung KS, Pinedo M, Sriskandarajah C, Tiwari V (2019) Scheduling elective surgeries with emergency patients at shared operating rooms. Prod Oper Manag 28:1407\u20131430","journal-title":"Prod Oper Manag"},{"issue":"4","key":"272_CR60","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1016\/j.annals.2005.01.002","volume":"32","author":"PF Pai","year":"2005","unstructured":"Pai PF, Hong WC (2005) An improved neural network model in forecasting arrivals. Ann Tour Res 32(4):1138\u20131141","journal-title":"Ann Tour Res"},{"issue":"6","key":"272_CR61","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/j.jss.2005.02.025","volume":"79","author":"PF Pai","year":"2006","unstructured":"Pai PF, Hong WC (2006) Software reliability forecasting by support vector machines with simulated annealing algorithms. J Syst Softw 79(6):747\u2013755","journal-title":"J Syst Softw"},{"key":"272_CR62","doi-asserted-by":"crossref","unstructured":"Bartz-Beielstein T (2010) SPOT: an R package for automatic and interactive tuning of optimization algorithms by sequential parameter optimization. arXiv: 1006. 4645","DOI":"10.1007\/978-3-642-02538-9_14"},{"key":"272_CR63","first-page":"1","volume":"2010","author":"F Ardjani","year":"2010","unstructured":"Ardjani F, Sadouni K, Benyettou M (2010) Optimization of SVM MultiClass by Particle Swarm (PSO-SVM), 2010 2nd International Workshop on Database Technology and Applications. Wuhan, China 2010:1\u20134","journal-title":"Wuhan, China"},{"issue":"5","key":"272_CR64","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/LSP.2009.2016444","volume":"16","author":"D Boutte","year":"2009","unstructured":"Boutte D, Santhanam B (2009) A hybrid ICA-SVM approach to continuous phase modulation recognition. IEEE Signal Process Lett 16(5):402\u2013405","journal-title":"IEEE Signal Process Lett"},{"key":"272_CR65","doi-asserted-by":"crossref","unstructured":"Devi KN, Bhaskaran VM, Kumar GP (2015) Cuckoo optimized SVM for stock market prediction. 2015 Int Conf Innov Inf Embed Commun Syst (ICIIECS) India, pp 1\u20135","DOI":"10.1109\/ICIIECS.2015.7192906"},{"key":"272_CR66","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S0377-2217(99)00348-3","volume":"128","author":"P Ji","year":"2001","unstructured":"Ji P, Sze MT, Lee WB (2001) A genetic algorithm of determining cycle time for printed circuit board assembly lines. Eur J Oper Res 128:175\u2013184","journal-title":"Eur J Oper Res"},{"key":"272_CR67","doi-asserted-by":"crossref","first-page":"5031","DOI":"10.1080\/00207540412331285814","volume":"42","author":"DM Kodek","year":"2004","unstructured":"Kodek DM, Krisper M (2004) Optimal algorithm for minimizing production cycle time of a printed circuit board assembly line. Int J Prod Res 42:5031\u20135048","journal-title":"Int J Prod Res"},{"issue":"2","key":"272_CR68","first-page":"203","volume":"8","author":"A Ebrahimnejad","year":"2015","unstructured":"Ebrahimnejad A, Karimnejad Z, Alrezaamiri H (2015) Particle swarm optimization algorithm for solving shortest path problems with mixed fuzzy arc weights. Int J Appl Decis Sci 8(2):203\u2013222","journal-title":"Int J Appl Decis Sci"},{"key":"272_CR69","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1007\/s40747-021-00278-0","volume":"7","author":"A Ebrahimnejad","year":"2021","unstructured":"Ebrahimnejad A, Enayattabr M, Motameni H (2021) Modified artificial bee colony algorithm or solving mixed interval-valued fuzzy shortest path problem. Complex Intell Syst 7:1527\u20131545","journal-title":"Complex Intell Syst"},{"key":"272_CR70","first-page":"411","volume":"38","author":"B Yu","year":"2011","unstructured":"Yu B, Yang ZZ, Yao BZ (2011) A hybrid algorithm for vehicle routing problem with time windows. Expert Syst Appl 38:411\u2013435","journal-title":"Expert Syst Appl"},{"issue":"3","key":"272_CR71","first-page":"283","volume":"8","author":"H Yousefi","year":"2017","unstructured":"Yousefi H, Tavakkoli-Moghaddam R, Oliaei N, Mohammadi M, Mozaffari A (2017) Solving a bi-objective vehicle routing problem under uncertainty by a revised multi-choice goal programming approach. Int J Ind Eng Comput 8(3):283\u2013302","journal-title":"Int J Ind Eng Comput"},{"key":"272_CR72","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.eswa.2017.10.023","volume":"94","author":"E Ahmadi","year":"2018","unstructured":"Ahmadi E, Jasemi M, Monplaisir L, Nabavi MA, Mahmoodi A, Jam PA (2018) New efficient hybrid candlestick technical analysis model for stock market timing on the basis of the Support Vector Machine and Heuristic Algorithms of Imperialist Competition and Genetic. Expert Syst Appl 94:21\u201331","journal-title":"Expert Syst Appl"},{"issue":"2","key":"272_CR73","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1111\/j.0000-0000.2012.01042.x","volume":"33","author":"E Stanley","year":"2012","unstructured":"Stanley E, Griffis J, Bell E, Closs DJ (2012) Metaheuristics in logistics and supply chain management. J Bus Logist 33(2):90\u2013106","journal-title":"J Bus Logist"},{"issue":"12","key":"272_CR74","doi-asserted-by":"crossref","first-page":"11066","DOI":"10.1016\/j.eswa.2012.03.016","volume":"39","author":"J-H Zhang","year":"2012","unstructured":"Zhang J-H, Li J, Liu Z-P (2012) Multiple-resource and multiple-depot emergency response problem considering secondary disasters. Expert Syst Appl 39(12):11066\u201311071","journal-title":"Expert Syst Appl"},{"issue":"101780","key":"272_CR75","first-page":"1","volume":"50","author":"B Bodaghi","year":"2020","unstructured":"Bodaghi B, Shahparvari S, Fadaki M, Lau KH, Ekambaram P, Chhetri P (2020) Multi-resource scheduling and routing for emergency recovery operations. Int J Disaster Risk Reduct 50(101780):1\u201323","journal-title":"Int J Disaster Risk Reduct"},{"issue":"1","key":"272_CR76","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.ejor.2008.10.023","volume":"199","author":"M \u00d6zlen","year":"2009","unstructured":"\u00d6zlen M, Azizo\u011flu M (2009) Multi-objective integer programming: a general approach for generating all non-dominated solutions. Eur J Oper Res 199(1):25\u201335","journal-title":"Eur J Oper Res"},{"issue":"2","key":"272_CR77","doi-asserted-by":"crossref","first-page":"1881","DOI":"10.1016\/j.asoc.2010.06.003","volume":"11","author":"WC Hong","year":"2011","unstructured":"Hong WC, Dong Y, Chen LY, Wei SY (2011) SVR with hybrid chaotic genetic algorithms for tourism demand forecasting. Appl Soft Comput 11(2):1881\u20131890","journal-title":"Appl Soft Comput"},{"key":"272_CR78","doi-asserted-by":"crossref","unstructured":"Guignard-Spielberg M, Spielberg K (2005) Integer programming: state of the art and recent advances. Ann Oper Res 139. Springer, New York","DOI":"10.1007\/s10479-005-3441-2"},{"key":"272_CR79","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1007\/978-3-540-68279-0","volume-title":"50 years of integer programming 1958\u20132008: from the early years to the state-of-the-art","author":"\u039c J\u00fcnger","year":"2010","unstructured":"J\u00fcnger \u039c, Liebling T, Naddef D, Nemhauser G, Pulleyblank W, Reinelt G, Rinaldi G, Wolsey L (2010) 50 years of integer programming 1958\u20132008: from the early years to the state-of-the-art. Springer-Verlag, New York, p 2010"},{"issue":"1","key":"272_CR80","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1137\/130915303","volume":"57","author":"JP Vielma","year":"2015","unstructured":"Vielma JP (2015) Mixed integer linear programming formulation techniques. SIAM Rev 57(1):3\u201357","journal-title":"SIAM Rev"},{"key":"272_CR81","doi-asserted-by":"crossref","unstructured":"Bixby R, Fenelon M, Gu Z, Rothberg E, Wunderling R (2000) MIP: theory and practice\u2014closing the gap, in system modelling and optimization. In: Powell, M.J.D., Scholtes, S. (eds) System modelling and optimization. CSMO 1999. IFIP \u2014 The International Federation for Information Processing, Springer, Boston, MA. 46:19\u201350","DOI":"10.1007\/978-0-387-35514-6_2"},{"key":"272_CR82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12532-008-0001-1","volume":"1","author":"T Achterberg","year":"2009","unstructured":"Achterberg T (2009) SCIP: Solving constraint integer programs. Math Program Comput 1:1\u201341","journal-title":"Math Program Comput"},{"key":"272_CR83","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10479-006-0091-y","volume":"149","author":"R Bixby","year":"2007","unstructured":"Bixby R, Rothberg E (2007) Progress in computational mixed integer programming: a look back from the other side of the tipping point. Ann Oper Res 149:37\u201341","journal-title":"Ann Oper Res"},{"key":"272_CR84","first-page":"309","volume":"18","author":"R Bixby","year":"2004","unstructured":"Bixby R, Fenelon M, Gu Z, Rothberg E, Wunderling R (2004) Mixed-integer programming: a progress report, in The sharpest cut: the impact of Manfred Padberg and His Work, SIAM, Philadelphia, PA, 2004. Chap 18:309\u2013325","journal-title":"Chap"},{"key":"272_CR85","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1287\/ijoc.12.1.2.11900","volume":"12","author":"EL Johnson","year":"2000","unstructured":"Johnson EL, Nemhauser GL, Savelsbergh MWP (2000) Progress in linear programming-based algorithms for integer programming: an exposition. Informs J Comput 12:2\u201323","journal-title":"Informs J Comput"},{"issue":"2","key":"272_CR86","first-page":"7","volume":"10","author":"S Dzomira","year":"2015","unstructured":"Dzomira S (2015) Cyber-banking fraud risk mitigation conceptual model. Banks Bank Syst 10(2):7\u201314","journal-title":"Banks Bank Syst"},{"key":"272_CR87","unstructured":"Mac F (2015) Fraud mitigation best practices. Available at [Online]\u00a0www.freddiemac.com. [Accessed 7 Jul 2021]"},{"key":"272_CR88","unstructured":"Cichonski P, Millar T, Grance T, Scarfone K (2012) Computer security incident handling guide: SP 800\u201361 Rev. 2. Available [Online] at https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-61\/rev-2\/final. [Accessed 5 May 2023]"},{"key":"272_CR89","doi-asserted-by":"crossref","unstructured":"Laporte G, Toth P (2022) A gap in scientific reporting. 4OR\u00a020:169\u2013171","DOI":"10.1007\/s10288-021-00483-0"}],"container-title":["Operations Research Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43069-023-00272-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43069-023-00272-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43069-023-00272-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T06:20:18Z","timestamp":1711434018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43069-023-00272-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"references-count":89,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1007\/s43069-023-00272-x","relation":{},"ISSN":["2662-2556"],"issn-type":[{"value":"2662-2556","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"23 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The study requires no ethical approval.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This is not applicable to this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"This is not applicable to this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"2"}}