{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:06:14Z","timestamp":1767985574479,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05010-4","type":"journal-article","created":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:45:43Z","timestamp":1750247143000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model"],"prefix":"10.1007","volume":"28","author":[{"given":"Alia Nabil","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Vitor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Abdelaziz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,18]]},"reference":[{"key":"5010_CR1","doi-asserted-by":"publisher","unstructured":"Iqbal, A., Aftab, S., Ali, U., Nawaz, Z., Sana, L., Ahmad, M., Husen, A.: Performance analysis of machine learning techniques on software defect prediction using NASA datasets. Int. J. Adv. Comput. Sci. Appl. (2019). https:\/\/doi.org\/10.14569\/ijacsa.2019.0100538","DOI":"10.14569\/ijacsa.2019.0100538"},{"issue":"3","key":"5010_CR2","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.infsof.2011.09.007","volume":"54","author":"Y Ma","year":"2012","unstructured":"Ma, Y., Luo, G., Zeng, X., Chen, A.: Transfer learning for cross-company software defect prediction. Inf. Softw. Technol. 54(3), 248\u2013256 (2012). https:\/\/doi.org\/10.1016\/j.infsof.2011.09.007","journal-title":"Inf. Softw. Technol."},{"issue":"6","key":"5010_CR3","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., Counsell, S.: A systematic literature review on faultprediction performance in software engineering. IEEE Trans. Softw. Eng. 38(6), 1276\u20131304 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5010_CR4","doi-asserted-by":"publisher","unstructured":"\u00d6zak\u0131nc\u0131, R., Tarhan, A.: Early software defect prediction: a systematic map and review. J. Syst. Softw. 144, 216\u2013239 (2018). https:\/\/doi.org\/10.1016\/j.jss.2018.06.025","DOI":"10.1016\/j.jss.2018.06.025"},{"key":"5010_CR5","doi-asserted-by":"publisher","unstructured":"Dhanda, N., Datta, S.S., Dhanda, M.: Software bug prediction using supervised machine learning algorithms. In: 2019 International Conference on Data Science and Communication (IconDSC), pp. 210\u2013233. Bangalore, India (2019). https:\/\/doi.org\/10.4018\/978-1-5225-7955-7.ch009","DOI":"10.4018\/978-1-5225-7955-7.ch009"},{"issue":"3","key":"5010_CR6","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TSE.2010.90","volume":"37","author":"Q Song","year":"2011","unstructured":"Song, Q., Jia, Z., Shepperd, M., Ying, S., Liu, J.: A general software defect-proneness prediction framework. IEEE Trans. Softw. Eng. 37(3), 356\u2013370 (2011). https:\/\/doi.org\/10.1109\/TSE.2010.90","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5010_CR7","doi-asserted-by":"publisher","unstructured":"Giger, E., D\u2019Ambros, M., Pinzger, M., Gall, H.C.: Method-level bug prediction. In: 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 171\u2013180. Lund, Sweden (2012). https:\/\/doi.org\/10.1145\/2372251.2372285","DOI":"10.1145\/2372251.2372285"},{"key":"5010_CR8","doi-asserted-by":"publisher","unstructured":"Moser, R., Pedrycz, W., Succi, G.: A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: 2008 ACM\/IEEE 30th International Conference on Software Engineering, pp. 181\u2013190 (2008). Leipzig, Germany. https:\/\/doi.org\/10.1145\/1368088.1368114","DOI":"10.1145\/1368088.1368114"},{"key":"5010_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.neucom.2019.11.067","volume":"385","author":"L Qiao","year":"2020","unstructured":"Qiao, L., Li, X., Umer, Q., Guo, P.: Deep learning based software defect prediction. Neurocomputing 385, 100\u2013110 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2019.11.067","journal-title":"Neurocomputing"},{"key":"5010_CR10","doi-asserted-by":"publisher","unstructured":"Taba, S.E.S., Khomh, F., Zou, Y., Hassan, A.E., Nagappan, M.: Predicting bugs using antipatterns. In: 2013 IEEE International Conference on Software Maintenance, pp. 270\u2013279. Eindhoven, Netherlands (2013). https:\/\/doi.org\/10.1109\/ICSM.2013.38","DOI":"10.1109\/ICSM.2013.38"},{"issue":"4","key":"5010_CR11","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1016\/j.aej.2018.01.003","volume":"57","author":"S Moustafa","year":"2018","unstructured":"Moustafa, S., ElNainay, M.Y., Makky, N.E., Abougabal, M.S.: Software bug prediction using weighted majority voting techniques. Alex. Eng. J. 57(4), 2763\u20132774 (2018). https:\/\/doi.org\/10.1016\/j.aej.2018.01.003","journal-title":"Alex. Eng. J."},{"key":"5010_CR12","doi-asserted-by":"publisher","unstructured":"Assim, M., Obeidat, Q., Hammad, M.: Software defects prediction using machine learning algorithms. In: 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy, ICDABI 2020 (2020). https:\/\/doi.org\/10.1109\/ICDABI51230.2020.9325677","DOI":"10.1109\/ICDABI51230.2020.9325677"},{"issue":"1","key":"5010_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1504\/IJES.2023.134124","volume":"16","author":"C Liang","year":"2023","unstructured":"Liang, C., Liu, J., Feng, J., Xiao, A., Zeng, H., Wu, Q., Yu, T.: Automatic detection of contextual defects based on machine learning. Int. J. Embed. Syst. 16(1), 75\u201382 (2023). https:\/\/doi.org\/10.1504\/IJES.2023.134124","journal-title":"Int. J. Embed. Syst."},{"key":"5010_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111026","volume":"180","author":"K Zhu","year":"2021","unstructured":"Zhu, K., Ying, S., Zhang, N., Zhu, D.: Software defect prediction based on enhanced metaheuristic feature selection optimization and a hybrid deep neural network. J. Syst. Softw. 180, 111026 (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.111026","journal-title":"J. Syst. Softw."},{"key":"5010_CR15","doi-asserted-by":"publisher","unstructured":"Zhou, T., Sun, X., Xia, X., Li, B., Chen, X.: Improving defect prediction with deep forest. Inf. Softw. Technol. 114, 204\u2013216 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2019.07.003","DOI":"10.1016\/j.infsof.2019.07.003"},{"key":"5010_CR16","doi-asserted-by":"publisher","unstructured":"Qiu, X., Fan, P., Ren, J. (2023). Convolutional neural network-based research on software engineering defect prediction. In: ACM International Conference Proceeding Series, pp. 305\u2013308. https:\/\/doi.org\/10.1145\/3640115.3640164","DOI":"10.1145\/3640115.3640164"},{"key":"5010_CR17","doi-asserted-by":"publisher","unstructured":"Khleel, N.A.A., Neh\u00e9z, K.: A novel approach for software defect prediction using CNN and GRU based on SMOTE Tomek method. In: Journal of Intelligent Information Systems, vol. 60. Springer US (2023). https:\/\/doi.org\/10.1007\/s10844-023-00793-1","DOI":"10.1007\/s10844-023-00793-1"},{"issue":"4","key":"5010_CR18","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jer.2023.10.038","volume":"11","author":"X Dong","year":"2023","unstructured":"Dong, X., Liang, Y., Miyamoto, S., Yamaguchi, S.: Ensemble learning based software defect prediction. J. Eng. Res. (Kuwait) 11(4), 377\u2013391 (2023). https:\/\/doi.org\/10.1016\/j.jer.2023.10.038","journal-title":"J. Eng. Res. (Kuwait)"},{"key":"5010_CR19","doi-asserted-by":"publisher","unstructured":"Malhotra, R., Nishant, Gurha, S., Rathi, V.: Application of particle swarm optimization for software defect prediction using object oriented metrics. In: Proceedings of the Confluence 2021: 11th International Conference on Cloud Computing, Data Science and Engineering, pp. 88\u201393 (2021). https:\/\/doi.org\/10.1109\/Confluence51648.2021.9377116","DOI":"10.1109\/Confluence51648.2021.9377116"},{"key":"5010_CR20","doi-asserted-by":"publisher","unstructured":"Abdelaziz, A., Santos, V., Dias, M.S., Mahmoud, A.N.: A hybrid model of self-organizing map and deep learning with genetic algorithm for managing energy consumption in public buildings. J. Clean. Prod. 434, 140040 (2024). https:\/\/doi.org\/10.1016\/j.jclepro.2023.140040","DOI":"10.1016\/j.jclepro.2023.140040"},{"issue":"1","key":"5010_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-024-64526-2","volume":"14","author":"Y Qiu","year":"2024","unstructured":"Qiu, Y., Yang, X., Chen, S.: An improved gray wolf optimization algorithm solving to functional optimization and engineering design problems. Sci. Rep. 14(1), 1\u201324 (2024). https:\/\/doi.org\/10.1038\/s41598-024-64526-2","journal-title":"Sci. Rep."},{"key":"5010_CR22","doi-asserted-by":"publisher","unstructured":"Shehab, M., Abu-Hashem, M.A., Shambour, M.K.Y., Alsalibi, A.I., Alomari, O.A., Gupta, J.N.D., et al.: A comprehensive review of bat inspired algorithm: variants, applications, and hybridization. In: Archives of Computational Methods in Engineering, vol. 30. Springer, Netherlands (2023). https:\/\/doi.org\/10.1007\/s11831-022-09817-5","DOI":"10.1007\/s11831-022-09817-5"},{"issue":"10","key":"5010_CR23","doi-asserted-by":"publisher","first-page":"9622","DOI":"10.1016\/j.jksuci.2021.11.016","volume":"34","author":"P Monga","year":"2022","unstructured":"Monga, P., Sharma, M., Sharma, S.K.: A comprehensive meta-analysis of emerging swarm intelligent computing techniques and their research trend. J. King Saud Univ. Comput. Inform. Sci. 34(10), 9622\u20139643 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2021.11.016","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"issue":"4","key":"5010_CR24","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.jksuci.2019.03.006","volume":"32","author":"W Rhmann","year":"2020","unstructured":"Rhmann, W., Pandey, B., Ansari, G., Pandey, D.K.: Software fault prediction based on change metrics using hybrid algorithms: an empirical study. J. King Saud Univ. 32(4), 419\u2013424 (2020). https:\/\/doi.org\/10.1016\/j.jksuci.2019.03.006","journal-title":"J. King Saud Univ."},{"key":"5010_CR25","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","volume":"83","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili, S.: The ant lion optimizer. Adv. Eng. Softw. 83, 80\u201398 (2015). https:\/\/doi.org\/10.1016\/j.advengsoft.2015.01.010","journal-title":"Adv. Eng. Softw."},{"key":"5010_CR26","doi-asserted-by":"publisher","unstructured":"Sutar, S., Kumar, R., Pai, S., Shwetha, B.R.: Defect prediction based on machine learning using system test parameters. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 134\u2013139. IEEE, Dubai (2019). https:\/\/doi.org\/10.1109\/AICAI.2019.8701345","DOI":"10.1109\/AICAI.2019.8701345"},{"issue":"2","key":"5010_CR27","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5815\/ijisa.2019.02.05","volume":"11","author":"T Lamba","year":"2019","unstructured":"Lamba, T., Kavita, Mishra, A.K.: Optimal machine learning model for software defect prediction. Int. J. Intell. Syst. Appl. 11(2), 36\u201348 (2019). https:\/\/doi.org\/10.5815\/ijisa.2019.02.05","journal-title":"Int. J. Intell. Syst. Appl."},{"key":"5010_CR28","doi-asserted-by":"publisher","unstructured":"Arora, I., Saha, A.: Software defect prediction: a comparison between artificial neural network and support vector machine. In: Advanced Computing and Communication Technologies, vol. 562. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-4603-2_6","DOI":"10.1007\/978-981-10-4603-2_6"},{"key":"5010_CR29","doi-asserted-by":"publisher","unstructured":"Babu, N., Himagiri, Krishna, V.V., Kumar, A.A., Ravi, M.: Software defect prediction analysis by using machine learning algorithms. Int. J. Recent Technol. Eng. 8, 3544\u20133546 (2019). https:\/\/doi.org\/10.35940\/ijrte.B1438.0982S1119","DOI":"10.35940\/ijrte.B1438.0982S1119"},{"key":"5010_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2401496","author":"P Kumudha","year":"2016","unstructured":"Kumudha, P., Venkatesan, R.: Cost-sensitive radial basis function neural network classifier for software defect prediction. Sci. World J. (2016). https:\/\/doi.org\/10.1155\/2016\/2401496","journal-title":"Sci. World J."},{"issue":"1","key":"5010_CR31","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.asej.2014.09.007","volume":"6","author":"AH Yousef","year":"2015","unstructured":"Yousef, A.H.: Extracting software static defect models using data mining. Ain Shams Eng. J. 6(1), 133\u2013144 (2015). https:\/\/doi.org\/10.1016\/j.asej.2014.09.007","journal-title":"Ain Shams Eng. J."},{"key":"5010_CR32","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.procs.2015.02.154","volume":"46","author":"R Mahajan","year":"2015","unstructured":"Mahajan, R., Gupta, S.K., Bedi, R.K.: Design of software fault prediction model using BR technique. Procedia Comput. Sci. 46, 849\u2013858 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.02.154","journal-title":"Procedia Comput. Sci."},{"key":"5010_CR33","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.asoc.2014.03.032","volume":"21","author":"R Malhotra","year":"2014","unstructured":"Malhotra, R.: Comparative analysis of statistical and machine learning methods for predicting faulty modules. Appl. Soft Comput. J. 21, 286\u2013297 (2014). https:\/\/doi.org\/10.1016\/j.asoc.2014.03.032","journal-title":"Appl. Soft Comput. J."},{"issue":"6","key":"5010_CR34","doi-asserted-by":"publisher","first-page":"4537","DOI":"10.1016\/j.eswa.2009.12.056","volume":"37","author":"J Zheng","year":"2010","unstructured":"Zheng, J.: Cost-sensitive boosting neural networks for software defect prediction. Expert Syst. Appl. 37(6), 4537\u20134543 (2010). https:\/\/doi.org\/10.1016\/j.eswa.2009.12.056","journal-title":"Expert Syst. Appl."},{"issue":"22","key":"5010_CR35","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5120\/12200-8368","volume":"70","author":"M Singh","year":"2013","unstructured":"Singh, M., Singh Salaria, D.: Software defect prediction tool based on neural network. Int. J. Comput. Appl. 70(22), 22\u201328 (2013). https:\/\/doi.org\/10.5120\/12200-8368","journal-title":"Int. J. Comput. Appl."},{"key":"5010_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.01.015","author":"S Kassaymeh","year":"2021","unstructured":"Kassaymeh, S., Abdullah, S., Al-Betar, M.A., Alweshah, M.: Salp swarm optimizer for modeling the software fault prediction problem. J. King Saud Univ. (2021). https:\/\/doi.org\/10.1016\/j.jksuci.2021.01.015","journal-title":"J. King Saud Univ."},{"key":"5010_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106940","volume":"99","author":"Z Sun","year":"2021","unstructured":"Sun, Z., Li, J., Sun, H., He, L.: CFPS: collaborative filtering based source projects selection for cross-project defect prediction. Appl. Soft Comput. 99, 106940 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.106940","journal-title":"Appl. Soft Comput."},{"key":"5010_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114637","volume":"171","author":"C Jin","year":"2021","unstructured":"Jin, C.: Cross-project software defect prediction based on domain adaptation learning and optimization. Expert Syst. Appl. 171, 114637 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.114637","journal-title":"Expert Syst. Appl."},{"key":"5010_CR39","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jss.2018.12.001","volume":"150","author":"L Pascarella","year":"2019","unstructured":"Pascarella, L., Palomba, F., Bacchelli, A.: Fine-grained just-in-time defect prediction. J. Syst. Softw. 150, 22\u201336 (2019). https:\/\/doi.org\/10.1016\/j.jss.2018.12.001","journal-title":"J. Syst. Softw."},{"key":"5010_CR40","doi-asserted-by":"publisher","unstructured":"McEwan, J.A., Clulow, A.J., Shaw, P.E., Nelson, A., Darwish, T.A., Burn, P.L., Gentle, I.R.: Diffusion at interfaces in OLEDs containing a doped phosphorescent emissive layer. Adv. Mater. Interfaces (2016). https:\/\/doi.org\/10.1002\/admi.201600184","DOI":"10.1002\/admi.201600184"},{"issue":"20","key":"5010_CR41","first-page":"5","volume":"5","author":"SS Maddipati","year":"2018","unstructured":"Maddipati, S.S., Srinivas, M.: Statistical testing on prediction of software defects. In: EAI Endorsed Transactions Statistical Testing on Prediction of Software Defects 5(20), 5\u201310 (2018)","journal-title":"Statistical testing on prediction of software defects. In: EAI Endorsed Transactions Statistical Testing on Prediction of Software Defects"},{"key":"5010_CR42","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.ins.2018.10.056","volume":"477","author":"H Wei","year":"2019","unstructured":"Wei, H., Hu, C., Chen, S., Xue, Y., Zhang, Q.: Establishing a software defect prediction model via effective dimension reduction. Inform. Sci. 477, 399\u2013409 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.10.056","journal-title":"Inform. Sci."},{"key":"5010_CR43","doi-asserted-by":"publisher","unstructured":"Fan, G., Diao, X., Yu, H., Yang, K., Chen, L.: Software defect prediction via attention-based recurrent neural network. Sci. Program. (2019). https:\/\/doi.org\/10.1155\/2019\/6230953","DOI":"10.1155\/2019\/6230953"},{"key":"5010_CR44","unstructured":"Saha, S.: A comprehensive guide to convolutional neural networks. Towards Data Sci. 15, 15 (2018)"},{"key":"5010_CR45","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601297","author":"S Morasca","year":"2014","unstructured":"Morasca, S.: Using logistic regression to estimate the number of faulty software modules. ACM Int. Conf. Proc. Ser (2014). https:\/\/doi.org\/10.1145\/2601248.2601297","journal-title":"ACM Int. Conf. Proc. Ser"},{"issue":"05","key":"5010_CR46","doi-asserted-by":"publisher","first-page":"85","DOI":"10.4236\/jsea.2019.125007","volume":"12","author":"A Alsaeedi","year":"2019","unstructured":"Alsaeedi, A., Khan, M.Z.: Software defect prediction using supervised machine learning and ensemble techniques: a comparative study. J. Softw. Eng. Appl. 12(05), 85\u2013100 (2019). https:\/\/doi.org\/10.4236\/jsea.2019.125007","journal-title":"J. Softw. Eng. Appl."},{"key":"5010_CR47","doi-asserted-by":"publisher","unstructured":"Abdelaziz, A., Darwish, N.R., Hefny, H.A.: Multiple linear regression for determining critical failure factors of agile software projects. Int. J. Intell. Eng. Syst. 12(3), 244\u2013255. https:\/\/doi.org\/10.22266\/IJIES2019.0630.24","DOI":"10.22266\/IJIES2019.0630.24"},{"key":"5010_CR48","doi-asserted-by":"publisher","unstructured":"Azzeh, M., Nassif, A.B., Talib, M.A., Iqbal, H.: Software defect prediction using non-dominated sorting genetic algorithm and k-nearest neighbour classifier. E-Inf. Softw. Eng. J. 18(1), 1\u201317 (2024). https:\/\/doi.org\/10.37190\/e-Inf240103","DOI":"10.37190\/e-Inf240103"},{"issue":"1","key":"5010_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s44147-024-00453-3","volume":"71","author":"AJ Anju","year":"2024","unstructured":"Anju, A.J., Judith, J.E.: Hybrid feature selection method for predicting software defect. J. Eng. Appl. Sci. 71(1), 1\u201321 (2024). https:\/\/doi.org\/10.1186\/s44147-024-00453-3","journal-title":"J. Eng. Appl. Sci."},{"issue":"3","key":"5010_CR50","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1007\/s10586-021-03282-8","volume":"24","author":"M Mustaqeem","year":"2021","unstructured":"Mustaqeem, M., Saqib, M.: Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection. Clust. Comput. 24(3), 2581\u20132595 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03282-8","journal-title":"Clust. Comput."},{"key":"5010_CR51","doi-asserted-by":"publisher","unstructured":"Mahmoud, A.N., Abdelaziz, A., Santos, V., Freire, M.M.: A proposed model for detecting defects in software projects. Indones. J. Electr. Eng. Comput. Sci. 33(1), 290\u2013302 (2024). https:\/\/doi.org\/10.11591\/ijeecs.v33.i1.pp290-302","DOI":"10.11591\/ijeecs.v33.i1.pp290-302"},{"key":"5010_CR52","unstructured":"Mohamed, A.A., Darwish, N.R., Hefny, H.A., Mazen, S.A.: An intelligent approach for predicting the failure of agile software projects. In: 53rd Annual Conference on Statistics, Computer Sciences, and Operation Research"},{"issue":"21","key":"5010_CR53","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1007\/s00521-018-3937-8","volume":"9","author":"N Bacanin","year":"2021","unstructured":"Bacanin, N., Stoean, R., Zivkovic, M., Petrovic, A., Rashid, T.A., Bezdan, T.: Performance of a novel chaotic firefly algorithm with enhanced exploration for tackling global optimization problems: application for dropout regularization. Mathematics 9(21), 2705 (2021). https:\/\/doi.org\/10.3390\/math9212705","journal-title":"Mathematics"},{"issue":"21","key":"5010_CR54","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1007\/s00521-018-3937-8","volume":"9","author":"S Malakar","year":"2020","unstructured":"Malakar, S., Ghosh, M., Bhowmik, S., Sarkar, R., Nasipuri, M.: A GA-based hierarchical feature selection approach for handwritten word recognition. Neural Comput. Appl., 32, 2533\u20132552 (2020). https:\/\/doi.org\/10.1007\/s00521-018-3937-8","journal-title":"Neural Comput. Appl."},{"issue":"21","key":"5010_CR55","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1007\/s00521-018-3937-8","volume":"9","author":"M Zivkovic","year":"2022","unstructured":"Zivkovic, M., Tair, M., Venkatachalam, K., Bacanin, N., Hub\u00e1lovsk\u00fd, \u0160., Trojovsk\u00fd, P.: Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification. PeerJ Comput. Sci. 8, e956 (2022). https:\/\/doi.org\/10.7717\/peerj-cs.956","journal-title":"Neural Comput. Appl."},{"key":"5010_CR56","doi-asserted-by":"publisher","unstructured":"Dobrojevic, M., Zivkovic, M., Chhabra, A., Sani, N.S., Bacanin, N., Mohd Amin, M.: Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach. PeerJ Comput. Sci. 9, e1405 (2023). https:\/\/doi.org\/10.7717\/peerj-cs.1405","DOI":"10.7717\/peerj-cs.1405"},{"key":"5010_CR57","doi-asserted-by":"publisher","unstructured":"Jovanovic, L., Gajevic, M. Dobrojevic, M., Budimirovic, N. Bacanin, N., Zivkovic, M.: Tackling IoT security challenge by metaheuristics tuned extreme learning machine. In: Raj, J.S., Perikos, I., Balas, V.E. (eds.) Intelligent Sustainable Systems (ICoISS 2023), Lecture Notes in Networks and Systems, vol. 665. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-1726-6_39","DOI":"10.1007\/978-981-99-1726-6_39"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05010-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05010-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05010-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:21:49Z","timestamp":1756930909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05010-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,18]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5010"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05010-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,18]]},"assertion":[{"value":"23 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"405"}}