{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T21:30:57Z","timestamp":1777671057010,"version":"3.51.4"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Hainan Province Science and Technology Special Fund","award":["ZDYF2024GXJS034"],"award-info":[{"award-number":["ZDYF2024GXJS034"]}]},{"name":"the Innovation Platform for Academicians of Hainan Province","award":["YSPTZX202036"],"award-info":[{"award-number":["YSPTZX202036"]}]},{"name":"the Hainan Provincial Natural Science Foundation of China","award":["621MS0787"],"award-info":[{"award-number":["621MS0787"]}]},{"name":"the Hainan Provincial Natural Science Foundation of China","award":["621QN271"],"award-info":[{"award-number":["621QN271"]}]},{"name":"the Education Department of Hainan Province","award":["Hnjg2019-50"],"award-info":[{"award-number":["Hnjg2019-50"]}]},{"name":"the Education Department of Hainan Province","award":["Hnky2024ZD-24"],"award-info":[{"award-number":["Hnky2024ZD-24"]}]},{"name":"the Sanya Science and Technology Special Fund","award":["2022KJCX30"],"award-info":[{"award-number":["2022KJCX30"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01174-x","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T09:29:05Z","timestamp":1747733345000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Leveraging machine learning to proactively identify phishing campaigns before they strike"],"prefix":"10.1186","volume":"12","author":[{"given":"Kun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meiyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xianglin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Long","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,20]]},"reference":[{"key":"1174_CR1","unstructured":"Johnson J. Global digital population 2020. https:\/\/datareportal.com\/reports\/. Accessed on 24 July 2022."},{"issue":"3","key":"1174_CR2","doi-asserted-by":"publisher","first-page":"672","DOI":"10.3390\/make3030034","volume":"3","author":"L Tang","year":"2021","unstructured":"Tang L, Mahmoud QH. A survey of machine learning-based solutions for phishing website detection. Mach Learn Knowl Extr. 2021;3(3):672\u201394.","journal-title":"Mach Learn Knowl Extr"},{"key":"1174_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2021.107197","volume":"37","author":"S Muhamad","year":"2021","unstructured":"Muhamad S, Kusairi S, Man M, Majid NFH, Kassim WZW. Digital adoption by enterprises in Malaysian industrial sectors during COVID-19 pandemic: a data article. Data Br. 2021;37: 107197.","journal-title":"Data Br"},{"issue":"2","key":"1174_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.31920\/2633-2930\/2021\/v2n2a1","volume":"2","author":"D Mhlanga","year":"2021","unstructured":"Mhlanga D. The fourth industrial revolution and COVID-19 pandemic in South Africa: the opportunities and challenges of introducing blended learning in education. J Afr Educ. 2021;2(2):15.","journal-title":"J Afr Educ"},{"issue":"3","key":"1174_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1111\/tesg.12453","volume":"111","author":"P Dannenberg","year":"2020","unstructured":"Dannenberg P, Fuchs M, Riedler T, Wiedemann C. Digital transition by COVID-19 pandemic? The German food online retail. Tijdschr voor Econ en Soc Geogr. 2020;111(3):543\u201360.","journal-title":"Tijdschr voor Econ en Soc Geogr"},{"key":"1174_CR6","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz OK, Buber E, Demir O, Diri B. Machine learning based phishing detection from URLs. Exp Syst Appl. 2019;117:345\u201357.","journal-title":"Exp Syst Appl"},{"key":"1174_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/5421046","volume":"2017","author":"AK Jain","year":"2017","unstructured":"Jain AK, Gupta BB. Phishing detection: analysis of visual similarity based approaches. Secur Commun Netw. 2017;2017:1.","journal-title":"Secur Commun. Netw"},{"key":"1174_CR8","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"AK Jain","year":"2019","unstructured":"Jain AK, Gupta BB. A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Humaniz Comput. 2019;10:2015\u201328.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1174_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2017.02.004","volume":"71","author":"M Volkamer","year":"2017","unstructured":"Volkamer M, Renaud K, Reinheimer B, Kunz A. User experiences of torpedo: Tooltip-powered phishing email detection. Comput Secur. 2017;71:100\u201313.","journal-title":"Comput Secur"},{"key":"1174_CR10","first-page":"86","volume":"51","author":"K Greene","year":"2018","unstructured":"Greene K, Steves M, Theofanos M. No phishing beyond this point. Computer (Long Beach Calif). 2018;51:86.","journal-title":"Computer (Long. Beach. Calif.)."},{"key":"1174_CR11","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.chb.2018.05.037","volume":"87","author":"SR Curtis","year":"2018","unstructured":"Curtis SR, Rajivan P, Jones DN, Gonzalez C. Phishing attempts among the dark triad: patterns of attack and vulnerability. Comput Hum Behav. 2018;87:174\u201382.","journal-title":"Comput Hum Behav"},{"issue":"4","key":"1174_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/3468.852434","volume":"30","author":"S Grazioli","year":"2000","unstructured":"Grazioli S, Jarvenpaa SL. \u201cPerils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Trans Syst Man Cybern A Syst Hum. 2000;30(4):395\u2013410.","journal-title":"IEEE Trans Syst Man Cybern A Syst Hum."},{"issue":"10","key":"1174_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic TN, Johnson NA, Jakobsson M, Menczer F. Social phishing. Commun ACM. 2007;50(10):94\u2013100.","journal-title":"Commun ACM"},{"key":"1174_CR14","unstructured":"Anti-phishing working group (APWG) legacy reports."},{"issue":"2","key":"1174_CR15","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1109\/TNSM.2022.3225217","volume":"20","author":"E Nowroozi","year":"2022","unstructured":"Nowroozi E, Mohammadi M, Conti M. An adversarial attack analysis on malicious advertisement URL detection framework. IEEE Trans Netw Serv Manag. 2022;20(2):1332\u201344.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1174_CR16","doi-asserted-by":"crossref","unstructured":"Hu J, Gao H, Yuan Q, Shi G. Dynamic content generation in large language models with real-time constraints. 2024.","DOI":"10.31219\/osf.io\/xje3w"},{"key":"1174_CR17","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1201\/9781003408307-7","volume-title":"Intelligent approaches to cyber security","author":"S Patil","year":"2023","unstructured":"Patil S, Shekokar NM. A study of recent techniques to detect zero-day phishing attacks. In: Vasudevan H, Durbha SS, Michalas A, Nagarhalli TP, editors. Intelligent approaches to cyber security. New York: Chapman and Hall\/CRC; 2023. p. 71\u201383."},{"key":"1174_CR18","first-page":"95931","volume":"37","author":"S Kim","year":"2025","unstructured":"Kim S, et al. Rethinking reconstruction-based graph-level anomaly detection: limitations and a simple remedy. Adv Neural Inf Proc Syst. 2025;37:95931\u201362.","journal-title":"Adv Neural Inf Proc Syst"},{"issue":"2","key":"1174_CR19","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/j.jksuci.2023.01.004","volume":"35","author":"A Safi","year":"2023","unstructured":"Safi A, Singh S. A systematic literature review on phishing website detection techniques. J King Saud Univ Inf Sci. 2023;35(2):590\u2013611.","journal-title":"J King Saud Univ Inf Sci"},{"key":"1174_CR20","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/3704522.3704532","volume-title":"Proceedings of the 11th international conference on networking, systems and security","author":"M Mia","year":"2024","unstructured":"Mia M, Derakhshan D, Pritom MM. Can features for phishing URL detection be trusted across diverse datasets? A case study with explainable AI. In: Mia M, editor. Proceedings of the 11th international conference on networking, systems and security. New York: Association for computing machinery; 2024. p. 137\u201345."},{"key":"1174_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2024.110446","volume":"164","author":"G Xiao","year":"2025","unstructured":"Xiao G, Tong H, Shu Y, Ni A. Spatial-temporal load prediction of electric bus charging station based on S2TAT. Int J Electr Power Energy Syst. 2025;164: 110446.","journal-title":"Int J Electr Power Energy Syst"},{"key":"1174_CR22","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-030-04648-4_43","volume-title":"Computational data and social networks: 7th international conference, CSoNet 2018, Shanghai, China, december 18\u201320, 2018, proceedings","author":"S Kumar","year":"2018","unstructured":"Kumar S, Faizan A, Viinikainen A, Hamalainen T. Mlspd-machine learning based spam and phishing detection. In: Chen X, Sen A, Li WW, Thai MT, editors. Computational data and social networks: 7th international conference, CSoNet 2018, Shanghai, China, december 18\u201320, 2018, proceedings. Cham: Springer International Publishing; 2018. p. 510\u201322."},{"issue":"1","key":"1174_CR23","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-020-00059-1","volume":"3","author":"MG Mohith Gowda","year":"2020","unstructured":"Mohith Gowda MG, Adithya MV, Gunesh Prasad S, Vinay S. Development of anti-phishing browser based on random forest and rule of extraction framework. Cybersecurity. 2020;3(1):20.","journal-title":"Cybersecurity"},{"key":"1174_CR24","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.cose.2019.03.018","volume":"84","author":"Y Ding","year":"2019","unstructured":"Ding Y, Luktarhan N, Li K, Slamu W. A keyword-based combination approach for detecting phishing webpages. Comput Secur. 2019;84:256\u201375.","journal-title":"Comput Secur"},{"key":"1174_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","volume":"94","author":"Y Li","year":"2019","unstructured":"Li Y, Yang Z, Chen X, Yuan H, Liu W. A stacking model using URL and HTML features for phishing webpage detection. Fut Gener Comput Syst. 2019;94:27\u201339.","journal-title":"Fut Gener Comput Syst"},{"key":"1174_CR26","first-page":"1","volume-title":"International conference on availability, reliability and security","author":"B Van Dooremaal","year":"2021","unstructured":"Van Dooremaal B, Burda P, Allodi L, Zannone N. Combining text and visual features to improve the identification of cloned webpages for early phishing detection. In: Burda P, editor. International conference on availability, reliability and security. New York: Association for computing machinery; 2021. p. 1\u201310."},{"key":"1174_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102123","volume":"104","author":"PA Barraclough","year":"2021","unstructured":"Barraclough PA, Fehringer G, Woodward J. Intelligent cyber-phishing detection for online. Comput Secur. 2021;104: 102123.","journal-title":"Comput Secur"},{"issue":"9","key":"1174_CR28","doi-asserted-by":"publisher","first-page":"3853","DOI":"10.1007\/s12652-019-01637-z","volume":"11","author":"RS Rao","year":"2020","unstructured":"Rao RS, Pais AR. Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. J Ambient Intell Humaniz Comput. 2020;11(9):3853\u201372.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1174_CR29","first-page":"1125","volume-title":"2020 3rd International conference on intelligent sustainable systems (ICISS)","author":"NF Abedin","year":"2020","unstructured":"Abedin NF, Bawm R, Sarwar T, Saifuddin M, Rahman MA, Hossain S. Phishing attack detection using machine learning classification techniques. In: Abedin NF, editor. 2020 3rd International conference on intelligent sustainable systems (ICISS). Thoothukudi: IEEE; 2020. p. 1125\u201330."},{"key":"1174_CR30","first-page":"1173","volume":"2020","author":"MN Alam","year":"2020","unstructured":"Alam MN, Sarma D, Lima FF, Saha I, Hossain S. Phishing attacks detection using machine learning approach. Third Int Conf Smart Syst Invent Technol. 2020;2020:1173\u20139.","journal-title":"Third Int Conf Smart Syst Invent Technol"},{"issue":"1","key":"1174_CR31","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s11235-021-00799-6","volume":"78","author":"\u00d6 Kasim","year":"2021","unstructured":"Kasim \u00d6. Automatic detection of phishing pages with event-based request processing, deep-hybrid feature extraction and light gradient boosted machine model. Telecommun Syst. 2021;78(1):103\u201315.","journal-title":"Telecommun Syst"},{"issue":"1","key":"1174_CR32","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11235-020-00739-w","volume":"76","author":"S Anupam","year":"2021","unstructured":"Anupam S, Kar AK. Phishing website detection using support vector machines and nature-inspired optimization algorithms. Telecommun Syst. 2021;76(1):17\u201332.","journal-title":"Telecommun Syst"},{"key":"1174_CR33","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/3388142.3388170","volume-title":"Proceedings of the 2020 4th International conference on compute and data analysis","author":"SS Sirigineedi","year":"2020","unstructured":"Sirigineedi SS, Soni J, Upadhyay H. Learning-based models to detect runtime phishing activities using URLs. In: Sirigineedi SS, editor. Proceedings of the 2020 4th International conference on compute and data analysis. New York: Association for computing machinery; 2020. p. 102\u20136."},{"key":"1174_CR34","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1109\/ICSSIT48917.2020.9214132","volume-title":"2020 Third international conference on smart systems and inventive technology (ICSSIT)","author":"I Saha","year":"2020","unstructured":"Saha I, Sarma D, Chakma RJ, Alam MN, Sultana A, Hossain S. Phishing attacks detection using deep learning approach. In: Saha I, editor. 2020 Third international conference on smart systems and inventive technology (ICSSIT). Tirunelveli: IEEE; 2020. p. 1180\u20135."},{"issue":"3","key":"1174_CR35","first-page":"3021","volume":"14","author":"DM Linh","year":"2024","unstructured":"Linh DM, Hung HD, Chau HM, Vu QS, Tran T-N. Real-time phishing detection using deep learning methods by extensions. Int J Electr Comput Eng. 2024;14(3):3021\u201335.","journal-title":"Int J Electr Comput Eng"},{"issue":"12","key":"1174_CR36","doi-asserted-by":"publisher","first-page":"17159","DOI":"10.1007\/s11227-024-06124-7","volume":"80","author":"R Zaimi","year":"2024","unstructured":"Zaimi R, Hafidi M, Lamia M. A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link. J Supercomput. 2024;80(12):17159\u201391.","journal-title":"J Supercomput"},{"key":"1174_CR37","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-031-52272-7_13","volume-title":"Cybersecurity and artificial intelligence: transformational strategies and disruptive innovation","author":"H Kamal","year":"2024","unstructured":"Kamal H, Gautam S, Mehrotra D, Sharif MS. Reinforcement learning model for detecting phishing websites. In: Jahankhani H, Bowen G, Sharif MS, Hussien O, editors. Cybersecurity and artificial intelligence: transformational strategies and disruptive innovation. Cham: Springer Nature; 2024. p. 309\u201326. https:\/\/doi.org\/10.1007\/978-3-031-52272-7_13."},{"issue":"2","key":"1174_CR38","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s10207-023-00778-9","volume":"23","author":"S Ariyadasa","year":"2024","unstructured":"Ariyadasa S, Fernando S, Fernando S. SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. Int J Inf Secur. 2024;23(2):1055\u201376. https:\/\/doi.org\/10.1007\/s10207-023-00778-9.","journal-title":"Int J Inf Secur"},{"issue":"5","key":"1174_CR39","doi-asserted-by":"publisher","first-page":"6413","DOI":"10.1007\/s11042-022-11900-9","volume":"81","author":"E Sutoyo","year":"2022","unstructured":"Sutoyo E, Rifai AP, Risnumawan A, Saputra M. A comparison of text weighting schemes on sentiment analysis of government policies: a case study of replacement of national examinations. Multimed Tools Appl. 2022;81(5):6413\u201331.","journal-title":"Multimed Tools Appl"},{"key":"1174_CR40","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1145\/2939672.2939785","volume-title":"Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","author":"T Chen","year":"2016","unstructured":"Chen T, Guestrin C. Xgboost: a scalable tree boosting system. In: Chen T, editor. Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. New York: Association for computing machinery; 2016. p. 785\u201394."},{"key":"1174_CR41","first-page":"4247","volume-title":"Proceedings 18th World IMACs\/MODSIM Congress","author":"C Liu","year":"2009","unstructured":"Liu C, White M, Newell G. Measuring the accuracy of species distribution models: a review. In: Liu C, editor. Proceedings 18th World IMACs\/MODSIM Congress, vol. 4241. Cairns: MODSIM Congress; 2009. p. 4247."},{"key":"1174_CR42","first-page":"7","volume-title":"Proceedings of the 11th Annual international conference on industrial engineering and operations management","author":"SK Ghosh","year":"2021","unstructured":"Ghosh SK, Janan F. Prediction of student\u2019s performance using random forest classifier. In: Ghosh SK, editor. Proceedings of the 11th Annual international conference on industrial engineering and operations management. Singapore: IEOM Society International; 2021. p. 7\u201311."},{"key":"1174_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Mach Learn. 2001;45:5\u201332.","journal-title":"Mach Learn"},{"key":"1174_CR44","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, Dorogush AV, Gulin A. CatBoost: unbiased boosting with categorical features. Adv Neur Inform Proc Syst. 2018;31."},{"key":"1174_CR45","unstructured":"Dorogush AV, Ershov V, Gulin A. CatBoost: gradient boosting with categorical features support. arXiv preprint. 2018. https:\/\/arxiv.org\/abs\/1810.11363."},{"key":"1174_CR46","first-page":"1","volume-title":"2019 International Russian automation conference (RusAutoCon)","author":"N Bakhareva","year":"2019","unstructured":"Bakhareva N, Shukhman A, Matveev A, Polezhaev P, Ushakov Y, Legashev L. Attack detection in enterprise networks by machine learning methods. In: Bakhareva N, editor. 2019 International Russian automation conference (RusAutoCon). Sochi: IEEE; 2019. p. 1\u20136."},{"key":"1174_CR47","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.ijhydene.2023.11.137","volume":"52","author":"AF Bandpey","year":"2024","unstructured":"Bandpey AF, Abdi J, Firozjaee TT. Improved estimation of dark fermentation biohydrogen production utilizing a robust categorical boosting machine-learning algorithm. Int J Hydr Energy. 2024;52:190\u20139.","journal-title":"Int J Hydr Energy"},{"issue":"4","key":"1174_CR48","first-page":"2094","volume":"5","author":"H Sharma","year":"2016","unstructured":"Sharma H, Kumar S. A survey on decision tree algorithms of classification in data mining. Int J Sci Res. 2016;5(4):2094\u20137.","journal-title":"Int J Sci Res"},{"issue":"06","key":"1174_CR49","first-page":"443","volume":"4","author":"G Singh","year":"2011","unstructured":"Singh G, Panda RK. Daily sediment yield modeling with artificial neural network using 10-fold cross-validation method: a small agricultural watershed, Kapgari, India. Int J Earth Sci Eng. 2011;4(06):443\u201350.","journal-title":"Int J Earth Sci Eng"},{"key":"1174_CR50","unstructured":"Lundberg SM, Lee SI. A unified approach to interpreting model predictions. Adv Neural Inform Process Syst. 2017;30."},{"key":"1174_CR51","doi-asserted-by":"publisher","first-page":"144352","DOI":"10.1109\/ACCESS.2021.3119110","volume":"9","author":"D Fryer","year":"2021","unstructured":"Fryer D, Str\u00fcmke I, Nguyen H. Shapley values for feature selection: the good, the bad, and the axioms. IEEE Access. 2021;9:144352\u201360.","journal-title":"IEEE Access"},{"key":"1174_CR52","unstructured":"Lundberg SM, Erion GG, Lee SI. Consistent individualized feature attribution for tree ensembles. arXiv preprint. 2018. https:\/\/arxiv.org\/abs\/1802.03888."},{"issue":"3","key":"1174_CR53","doi-asserted-by":"publisher","first-page":"88","DOI":"10.3390\/fi15030088","volume":"15","author":"Y Gebreyesus","year":"2023","unstructured":"Gebreyesus Y, Dalton D, Nixon S, De Chiara D, Chinnici M. Machine learning for data center optimizations: feature selection using shapley additive exPlanation (SHAP). Fut Internet. 2023;15(3):88.","journal-title":"Fut Internet"},{"issue":"2","key":"1174_CR54","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.chemolab.2006.01.007","volume":"83","author":"PM Granitto","year":"2006","unstructured":"Granitto PM, Furlanello C, Biasioli F, Gasperi F. Recursive feature elimination with random forest for PTR-MS analysis of agroindustrial products. Chemom Intell Lab Syst. 2006;83(2):83\u201390.","journal-title":"Chemom Intell Lab Syst"},{"key":"1174_CR55","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V. Gene selection for cancer classification using support vector machines. Mach Learn. 2002;46:389\u2013422.","journal-title":"Mach Learn"},{"key":"1174_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105075","volume":"114","author":"S Zhao","year":"2022","unstructured":"Zhao S, Zhang T, Ma S, Chen M. Dandelion optimizer: a nature-inspired metaheuristic algorithm for engineering applications. Eng Appl Artif Intell. 2022;114: 105075.","journal-title":"Eng Appl Artif Intell"},{"issue":"23","key":"1174_CR57","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.3390\/math10234539","volume":"10","author":"S Bergies","year":"2022","unstructured":"Bergies S, Su S-F, Elsisi M. Model predictive paradigm with low computational burden based on dandelion optimizer for autonomous vehicle considering vision system uncertainty. Mathematics. 2022;10(23):4539.","journal-title":"Mathematics"},{"key":"1174_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110011","volume":"259","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Montazeri Z, Trojovsk\u00e1 E, Trojovsk\u00fd P. Coati optimization algorithm: a new bio-inspired metaheuristic algorithm for solving optimization problems. Knowl Based Syst. 2023;259: 110011.","journal-title":"Knowl Based Syst"},{"key":"1174_CR59","doi-asserted-by":"publisher","first-page":"5235","DOI":"10.1007\/s10586-023-04221-5","volume":"27","author":"B Abdollahzadeh","year":"2024","unstructured":"Abdollahzadeh B, et al. Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning. Cluster Comput. 2024;27:5235.","journal-title":"Cluster Comput"},{"key":"1174_CR60","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-32964-7_31","volume-title":"Parallel Problem Solving from Nature-PPSN XII: 12th International Conference, Taormina, Italy, September 1\u20135, 2012, proceedings, part II 12","author":"JH Drake","year":"2012","unstructured":"Drake JH, \u00d6zcan E, Burke EK. \u201cAn improved choice function heuristic selection for cross-domain heuristic search. In: Drake JH, editor. Parallel Problem Solving from Nature-PPSN XII: 12th International Conference, Taormina, Italy, September 1\u20135, 2012, proceedings, part II 12. Berlin: Springer; 2012. p. 307\u201316."},{"issue":"1","key":"1174_CR61","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s42400-022-00126-9","volume":"5","author":"A Awasthi","year":"2022","unstructured":"Awasthi A, Goel N. Phishing website prediction using base and ensemble classifier techniques with cross-validation. Cybersecurity. 2022;5(1):22.","journal-title":"Cybersecurity"},{"issue":"1","key":"1174_CR62","doi-asserted-by":"crossref","first-page":"7058972","DOI":"10.1155\/2022\/8259909","volume":"2022","author":"R Yang","year":"2022","unstructured":"Yang R, Zheng K, Wu B, Li D, Wang Z, Wang X. Predicting user susceptibility to phishing based on multidimensional features. Comput Intell Neurosci. 2022;2022(1):7058972.","journal-title":"Comput Intell Neurosci"},{"issue":"2","key":"1174_CR63","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s41324-022-00489-8","volume":"31","author":"MK Pandey","year":"2023","unstructured":"Pandey MK, Singh MK, Pal S, Tiwari BB. Prediction of phishing websites using machine learning. Spat Inf Res. 2023;31(2):157\u201366.","journal-title":"Spat Inf Res"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01174-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01174-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01174-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T01:01:45Z","timestamp":1749949305000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01174-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,20]]},"references-count":63,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1174"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01174-x","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,20]]},"assertion":[{"value":"26 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"124"}}