{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T09:23:59Z","timestamp":1770888239737,"version":"3.50.1"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004488","name":"Croatian Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004488","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1016\/j.future.2025.107744","type":"journal-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T16:17:57Z","timestamp":1738945077000},"page":"107744","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Hierarchical risk parity: Efficient implementation and real world analysis"],"prefix":"10.1016","volume":"167","author":[{"given":"Dario","family":"Dekovi\u0107","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4447-1643","authenticated-orcid":false,"given":"Petra Posedel","family":"\u0160imovi\u0107","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.future.2025.107744_b1","first-page":"77","article-title":"Portfolio selection","volume":"7","author":"Markowitz","year":"1952","journal-title":"J. Financ."},{"issue":"4","key":"10.1016\/j.future.2025.107744_b2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3905\/jpm.2016.42.4.059","article-title":"Building diversified portfolios that outperform out of sample","volume":"42","author":"L\u00f3pez de Prado","year":"2016","journal-title":"J. Portf. Manag."},{"issue":"5","key":"10.1016\/j.future.2025.107744_b3","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1093\/rfs\/hhm075","article-title":"Optimal versus naive diversification: How inefficient is the 1\/N portfolio strategy?","volume":"22","author":"DeMiguel","year":"2009","journal-title":"Rev. Financ. Stud."},{"key":"10.1016\/j.future.2025.107744_b4","series-title":"Advances in Financial Machine Learning","author":"L\u00f3pez de Prado","year":"2018"},{"key":"10.1016\/j.future.2025.107744_b5","series-title":"Machine Learning for Asset Management","first-page":"329","article-title":"Hierarchical risk parity: Accounting for tail dependencies in multi-asset multi-factor allocations","author":"Lohre","year":"2020"},{"key":"10.1016\/j.future.2025.107744_b6","series-title":"A comparative study of hierarchical risk parity portfolio and eigen portfolio on the NIFTY 50 stocks","author":"Sen","year":"2022"},{"key":"10.1016\/j.future.2025.107744_b7","series-title":"2021 International Conference on Decision Aid Sciences and Application","article-title":"Hierarchical risk parity and minimum variance portfolio design on NIFTY 50 stocks","author":"Sen","year":"2021"},{"key":"10.1016\/j.future.2025.107744_b8","series-title":"Building diversified portfolios using the risk parity principle and machine learning","author":"Dekovi\u0107","year":"2023"},{"key":"10.1016\/j.future.2025.107744_b9","series-title":"A time series analysis-based stock price prediction using machine learning and deep learning models","author":"Mehtab","year":"2020"},{"issue":"2","key":"10.1016\/j.future.2025.107744_b10","article-title":"A comparative study of optimum risk portfolio and eigen portfolio on the Indian stock market","volume":"7","author":"Mehtab","year":"2021","journal-title":"Int. J. Bus. Forecast. Mark. Intell."},{"issue":"3","key":"10.1016\/j.future.2025.107744_b11","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1007\/s10614-022-10288-w","article-title":"On the modeling and simulation of portfolio allocation schemes: an approach based on network community detection","volume":"62","author":"Ferretti","year":"2023","journal-title":"Comput. Econom."},{"key":"10.1016\/j.future.2025.107744_b12","doi-asserted-by":"crossref","first-page":"30193","DOI":"10.1109\/ACCESS.2021.3059960","article-title":"Explainable machine learning exploiting news and domain-specific lexicon for stock market forecasting","volume":"9","author":"Carta","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2025.107744_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111550","article-title":"Optimizing investment portfolios with a sequential ensemble of decision tree-based models and the FBI algorithm for efficient financial analysis","volume":"158","author":"Chou","year":"2024","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"10.1016\/j.future.2025.107744_b14","doi-asserted-by":"crossref","first-page":"147","DOI":"10.4310\/CIS.2016.v16.n3.a2","article-title":"Trivariate and n-variate optimal smoothing splines with dynamic shape modeling of deforming object","volume":"16","author":"Kano","year":"2016","journal-title":"Commun. Inf. Syst."},{"issue":"15","key":"10.1016\/j.future.2025.107744_b15","doi-asserted-by":"crossref","first-page":"2941","DOI":"10.1080\/00207721.2021.1927236","article-title":"Optimal tuning of interval type-2 fuzzy controllers for nonlinear servo systems using Slime Mould Algorithm","volume":"54","author":"Precup","year":"2023","journal-title":"Int. J. Syst. Sci."},{"issue":"3\u20134","key":"10.1016\/j.future.2025.107744_b16","first-page":"351","article-title":"Binary anarchic society optimization for feature selection","volume":"26","author":"Kilic","year":"2023","journal-title":"Rom. J. Inf. Sci. Technol."},{"issue":"5","key":"10.1016\/j.future.2025.107744_b17","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1090\/noti1105","article-title":"Pseudo-mathematics and financial charlatanism: the effects of backtest overfitting on out-of-sample performance","volume":"61","author":"Bailey","year":"2014","journal-title":"Notices Amer. Math. Soc."},{"key":"10.1016\/j.future.2025.107744_b18","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10479-021-04075-3","article-title":"A novel hybrid PSO-based metaheuristic for costly portfolio selection problems","volume":"304","author":"Corazza","year":"2021","journal-title":"Ann. Oper. Res."},{"issue":"4","key":"10.1016\/j.future.2025.107744_b19","doi-asserted-by":"crossref","DOI":"10.3390\/e21040376","article-title":"Between nonlinearities, complexity, and noises: An application on portfolio selection using kernel principal component analysis","volume":"21","author":"Peng","year":"2019","journal-title":"Entropy"},{"key":"10.1016\/j.future.2025.107744_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.frl.2022.103608","article-title":"Hierarchical risk parity using security selection based on peripheral assets of correlation-based minimum spanning trees","volume":"53","author":"Cho","year":"2023","journal-title":"Finance Res. Lett."},{"key":"10.1016\/j.future.2025.107744_b21","series-title":"Introduction to algorithms","author":"Cormen","year":"2022"},{"key":"10.1016\/j.future.2025.107744_b22","series-title":"The Python Library Reference, Release 3.12.1","author":"Van Rossum","year":"2024"},{"issue":"1","key":"10.1016\/j.future.2025.107744_b23","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1086\/294846","article-title":"Mutual fund performance","volume":"39","author":"Sharpe","year":"1966","journal-title":"J. Bus."},{"key":"10.1016\/j.future.2025.107744_b24","series-title":"Quantitative risk management","first-page":"xix+699","author":"McNeil","year":"2015"},{"key":"10.1016\/j.future.2025.107744_b25","series-title":"Risk-Based and Factor Investing","author":"Jurczenko","year":"2015"},{"key":"10.1016\/j.future.2025.107744_b26","series-title":"Introduction to Risk Parity and Budgeting","author":"Roncalli","year":"2013"},{"key":"10.1016\/j.future.2025.107744_b27","series-title":"Evaluating the Financial Performance of Pension Funds","year":"2010"},{"issue":"3","key":"10.1016\/j.future.2025.107744_b28","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3905\/joi.3.3.59","article-title":"Performance measurement in a downside risk framework","volume":"3","author":"Sortino","year":"1994","journal-title":"J. Invest."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25000391?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25000391?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T23:04:30Z","timestamp":1745449470000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X25000391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":28,"alternative-id":["S0167739X25000391"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2025.107744","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Hierarchical risk parity: Efficient implementation and real world analysis","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2025.107744","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"107744"}}