{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:30:38Z","timestamp":1771889438633,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00262-4","type":"journal-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T16:59:05Z","timestamp":1745427545000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization"],"prefix":"10.1007","volume":"5","author":[{"given":"Romil","family":"Rawat","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"262_CR1","unstructured":"Wu C, et al. Hybrid NSGA-II for energy-efficient cybersecurity models. AI Sustainabil J. 2022."},{"key":"262_CR2","unstructured":"Chen Y, et al. Carbon footprint tracking with NSGA-II for cyber-attack detection. Appl AI Cybersecur. 2023."},{"key":"262_CR3","unstructured":"Gupta S, et al. Reducing energy consumption in cybercrime detection systems using evolutionary Algorithms. J Sustain AI. 2023."},{"key":"262_CR4","unstructured":"Patel D, et al. NSGA-II for multi-objective optimization in energy-efficient cybersecurity models. Comput Intell Cybersecur. 2024."},{"key":"262_CR5","unstructured":"International Energy Agency (IEA). World Energy Outlook 2020. https:\/\/www.iea.org\/reports\/world-energy-outlook-2020. 2020."},{"issue":"3","key":"262_CR6","first-page":"89","volume":"46","author":"M Frosini","year":"2021","unstructured":"Frosini M, Valli A. Cybersecurity in the energy sector: impact of machine learning and artificial intelligence. Energy J. 2021;46(3):89\u2013104.","journal-title":"Energy J"},{"key":"262_CR7","volume-title":"AI and its environmental impacts","author":"R Binns","year":"2019","unstructured":"Binns R, Smith K. AI and its environmental impacts. Springer; 2019."},{"issue":"1","key":"262_CR8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1186\/s42400-022-00132-x","volume":"5","author":"D Li","year":"2022","unstructured":"Li D, Chen Z. Advancements in AI for cybersecurity. AI Cybersecur Rev. 2022;5(1):30\u201345.","journal-title":"AI Cybersecur Rev"},{"issue":"4","key":"262_CR9","first-page":"22","volume":"12","author":"S Bonar","year":"2020","unstructured":"Bonar S, Hart A. Assessing the carbon footprint of machine learning. J Green Comput. 2020;12(4):22\u201340.","journal-title":"J Green Comput"},{"key":"262_CR10","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"K Deb","year":"2017","unstructured":"Deb K, Jain H. Multi-objective optimization using evolutionary algorithms. Wiley; 2017."},{"issue":"3","key":"262_CR11","first-page":"68","volume":"28","author":"N Soni","year":"2022","unstructured":"Soni N, Singh R. NSGA-II in machine learning and feature selection. J Evol Comput. 2022;28(3):68\u201384.","journal-title":"J Evol Comput"},{"key":"262_CR12","unstructured":"Singh R, et al. NSGA-II for enhancing vulnerability detection in cyber-attacks. Cybersecur Res J. 2016."},{"key":"262_CR13","unstructured":"Johnson K, Wei L. Energy-efficient machine learning models for dark web traffic analysis. J Cyber Intell. 2017."},{"key":"262_CR14","unstructured":"Ahmed T, et al. Multi-objective optimization in intrusion detection systems using NSGA-II. Comput Secur J. 2018."},{"key":"262_CR15","unstructured":"Jain M, et al. Optimizing energy consumption in feature selection via NSGA-II. Sustain Comput Syst. 2019"},{"key":"262_CR16","unstructured":"Lee H, Park J. Minimizing carbon footprint in AI-driven cybersecurity applications. Energy Inf J. 2020."},{"key":"262_CR17","unstructured":"Zhang L, et al. Multi-objective optimization for cyber vulnerability assessments using machine learning. Cybersecur Adv. 2021."},{"issue":"3","key":"262_CR18","first-page":"145","volume":"10","author":"T Johnson","year":"2017","unstructured":"Johnson T, Wei K. Energy-efficient machine learning models for analyzing Dark Web traffic. J Cybersecur Res. 2017;10(3):145\u201359.","journal-title":"J Cybersecur Res"},{"issue":"1","key":"262_CR19","first-page":"24","volume":"12","author":"S Ahmed","year":"2018","unstructured":"Ahmed S, Roy P, Das M. Optimization of intrusion detection systems using NSGA-II. Int J Comput Sci Secur. 2018;12(1):24\u201333.","journal-title":"Int J Comput Sci Secur"},{"key":"262_CR20","first-page":"123","volume":"85","author":"R Kumar","year":"2019","unstructured":"Kumar R, Gupta A, Singh V. Hybrid NSGA-II for vulnerability detection in cybersecurity. Comput Secur. 2019;85:123\u201334.","journal-title":"Comput Secur"},{"issue":"2","key":"262_CR21","first-page":"88","volume":"14","author":"C Lee","year":"2020","unstructured":"Lee C, Park J. Multi-objective optimization for carbon footprint reduction in cybersecurity tasks. Environ Comput J. 2020;14(2):88\u201398.","journal-title":"Environ Comput J"},{"key":"262_CR22","volume":"183","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Liu H, Chen X. NSGA-II with machine learning for predicting cyber-attack vulnerabilities. Expert Syst Appl. 2021;183: 115400.","journal-title":"Expert Syst Appl"},{"key":"262_CR23","volume":"115","author":"Z Wu","year":"2022","unstructured":"Wu Z, Zhao L, Yang Q. Hybrid NSGA-II-based optimization for energy-efficient cybersecurity models. Appl Soft Comput. 2022;115: 107848.","journal-title":"Appl Soft Comput"},{"key":"262_CR24","volume":"37","author":"J Chen","year":"2023","unstructured":"Chen J, Wang S, Li F. NSGA-II for carbon footprint and resource optimization in cyber-attack detection. Sustain Comput Inf Syst. 2023;37: 100760.","journal-title":"Sustain Comput Inf Syst"},{"key":"262_CR25","volume":"110","author":"P Gupta","year":"2023","unstructured":"Gupta P, Bhattacharya T, Patel N. Evolutionary algorithms for reducing energy consumption in cybersecurity systems. Comput Electr Eng. 2023;110: 108009.","journal-title":"Comput Electr Eng"},{"issue":"1","key":"262_CR26","first-page":"12","volume":"8","author":"S Patel","year":"2024","unstructured":"Patel S, Singh K, Choudhury R. Multi-objective optimization using NSGA-II for cybersecurity systems. Int J Cybersecur Resil. 2024;8(1):12\u201323.","journal-title":"Int J Cybersecur Resil"},{"issue":"1","key":"262_CR27","first-page":"34","volume":"21","author":"A Singh","year":"2025","unstructured":"Singh A, Kaur J, Sharma P. Enhanced NSGA-II for machine learning model optimization in Dark Web analysis. Cybersecur Adv. 2025;21(1):34\u201347.","journal-title":"Cybersecur Adv"},{"key":"262_CR28","volume-title":"Optimization methods for multi-objective decision making","author":"D Vasquez","year":"2020","unstructured":"Vasquez D, Berghorn L. Optimization methods for multi-objective decision making. Springer; 2020."},{"issue":"4","key":"262_CR29","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.suscom.2011.06.001","volume":"1","author":"F Rahman","year":"2011","unstructured":"Rahman F, O\u2019Brien C, Ahamed SI, Zhang H, Liu L. Design and implementation of an open framework for ubiquitous carbon footprint calculator applications. Sustain Comput Inf Syst. 2011;1(4):257\u201374. https:\/\/doi.org\/10.1016\/j.suscom.2011.06.001.","journal-title":"Sustain Comput Inf Syst"},{"key":"262_CR30","doi-asserted-by":"publisher","unstructured":"Chen JL, Chen WC, Kuo A. Developing carbon footprint calculation software for display industry in Taiwan. In: 2016 Electronics Goes Green 2016+(EGG), pp. 1\u20137. IEEE. 2016; https:\/\/doi.org\/10.1109\/EGG.2016.7829863.","DOI":"10.1109\/EGG.2016.7829863"},{"key":"262_CR31","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-031-53227-6_31","volume-title":"International conference on software business","author":"A Sipil\u00e4","year":"2023","unstructured":"Sipil\u00e4 A, Partanen L, Porras J. Carbon footprint calculations for a software company-adapting GHG protocol scopes 1, 2 and 3 to the software industry. In: International conference on software business. Springer Nature Switzerland: Cham; 2023. p. 442\u201355. https:\/\/doi.org\/10.1007\/978-3-031-53227-6_31."},{"key":"262_CR32","doi-asserted-by":"publisher","first-page":"104547","DOI":"10.1016\/j.autcon.2022.104547","volume":"143","author":"H Rahimbakhsh","year":"2022","unstructured":"Rahimbakhsh H, Kohansal ME, Tarkashvand A, Faizi M, Rahbar M. Multi-objective optimization of natural surveillance and privacy in early design stages utilizing NSGA-II. Automat Constr. 2022;143:104547. https:\/\/doi.org\/10.1016\/j.autcon.2022.104547.","journal-title":"Automat Constr"},{"issue":"4","key":"262_CR33","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.3390\/su12041629","volume":"12","author":"E Loyarte-L\u00f3pez","year":"2020","unstructured":"Loyarte-L\u00f3pez E, Barral M, Morla JC. Methodology for carbon footprint calculation towards sustainable innovation in intangible assets. Sustainability. 2020;12(4):1629. https:\/\/doi.org\/10.3390\/su12041629.","journal-title":"Sustainability"},{"key":"262_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2023.139806","volume":"434","author":"Y Peng","year":"2024","unstructured":"Peng Y, Wang Y, Chen H, Wang L, Luo B, Tong H, Chen S. Carbon reduction potential of a rain garden: a cradle-to-grave life cycle carbon footprint assessment. J Clean Prod. 2024;434: 139806. https:\/\/doi.org\/10.1016\/j.jclepro.2023.139806.","journal-title":"J Clean Prod"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00262-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00262-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00262-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T16:59:17Z","timestamp":1745427557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00262-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["262"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00262-4","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,23]]},"assertion":[{"value":"29 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"38"}}