{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T21:28:30Z","timestamp":1777670910023,"version":"3.51.4"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Hainan Province Science and Technology Special Fund","award":["ZDYF2024GXJS034"],"award-info":[{"award-number":["ZDYF2024GXJS034"]}]},{"name":"Hainan Engineering Research Center for Virtual Reality Technology and Systems","award":["Qiong fa Gai gao ji [2023] 818"],"award-info":[{"award-number":["Qiong fa Gai gao ji [2023] 818"]}]},{"name":"Hainan Engineering Research Center for Smart Education Technology","award":["Qiong fa Gai gao ji [2023] 818"],"award-info":[{"award-number":["Qiong fa Gai gao ji [2023] 818"]}]},{"name":"the Innovation Platform for Academicians of Hainan Province","award":["YSPTZX202036"],"award-info":[{"award-number":["YSPTZX202036"]}]},{"name":"the Sanya Science and Technology Special Fund","award":["2022KJCX30"],"award-info":[{"award-number":["2022KJCX30"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01289-1","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T10:00:27Z","timestamp":1762164027000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Enhanced ransomware attacks detection using feature selection, sensitivity analysis, and optimized hybrid model"],"prefix":"10.1186","volume":"12","author":[{"given":"Kun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yetong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"1289_CR1","doi-asserted-by":"crossref","unstructured":"Malik S, Shanmugam B, Kannorpatti K, Azam S. Critical feature selection for machine learning approaches to detect ransomware. Int J Comput Digit Syst. 2022;11(1).","DOI":"10.12785\/ijcds\/110195"},{"issue":"5","key":"1289_CR2","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.3390\/s22051837","volume":"22","author":"A Alqahtani","year":"2022","unstructured":"Alqahtani A, Sheldon FT. A survey of Crypto ransomware attack detection methodologies: an evolving outlook. Sensors. 2022;22(5):1837.","journal-title":"Sensors"},{"key":"1289_CR3","doi-asserted-by":"publisher","first-page":"101997","DOI":"10.1016\/j.cose.2020.101997","volume":"97","author":"F Tang","year":"2020","unstructured":"Tang F, Ma B, Li J, Zhang F, Su J, Ma J. RansomSpector: an introspection-based approach to detect Crypto ransomware. Comput Secur. 2020;97:101997.","journal-title":"Comput Secur"},{"key":"1289_CR4","unstructured":"Pestovska Z, \u0406\u0406\u0406., Changes in the financial services market under the influence of AI. Artificial Intelligence as a basis for the development of the digital economy. 2021;85."},{"key":"1289_CR5","doi-asserted-by":"crossref","unstructured":"Gupta A, Sharma V, Srivastava R. BISRAC Banking Information Security Risk Assessment and Compliance Model. In: 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE; 2021. pp. 1447\u201352.","DOI":"10.1109\/ICAC3N53548.2021.9725576"},{"issue":"1","key":"1289_CR6","doi-asserted-by":"publisher","first-page":"172","DOI":"10.3390\/app12010172","volume":"12","author":"U Urooj","year":"2021","unstructured":"Urooj U, Al-rimy BAS, Zainal A, Ghaleb FA, Rassam MA. Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Appl Sci. 2021;12(1):172.","journal-title":"Appl Sci"},{"key":"1289_CR7","unstructured":"Horduna M, L\u0103z\u0103rescu SM, Simion E. A note on machine learning applied in ransomware detection. Cryptol ePrint Archive. 2023."},{"key":"1289_CR8","doi-asserted-by":"publisher","first-page":"117597","DOI":"10.1109\/ACCESS.2022.3218779","volume":"10","author":"D Smith","year":"2022","unstructured":"Smith D, Khorsandroo S, Roy K. Machine learning algorithms and frameworks in ransomware detection. IEEE Access. 2022;10:117597\u2013610.","journal-title":"IEEE Access"},{"key":"1289_CR9","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.eswa.2018.02.039","volume":"102","author":"A Cohen","year":"2018","unstructured":"Cohen A, Nissim N. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst Appl. 2018;102:158\u201378.","journal-title":"Expert Syst Appl"},{"issue":"18","key":"1289_CR10","doi-asserted-by":"publisher","first-page":"e5422","DOI":"10.1002\/cpe.5422","volume":"32","author":"S Bae","year":"2020","unstructured":"Bae S, Il, Lee G, Bin, Im EG. Ransomware detection using machine learning algorithms. Concurr Comput. 2020;32(18):e5422.","journal-title":"Concurr Comput"},{"issue":"1","key":"1289_CR11","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/su14010008","volume":"14","author":"A Kapoor","year":"2021","unstructured":"Kapoor A, Gupta A, Gupta R, Tanwar S, Sharma G, Davidson IE. Ransomware detection, avoidance, and mitigation scheme: a review and future directions. Sustainability. 2021;14(1):8.","journal-title":"Sustainability"},{"issue":"4","key":"1289_CR12","first-page":"4","volume":"7","author":"M Al-Fawa\u2019reh","year":"2021","unstructured":"Al-Fawa\u2019reh M, Ashi Z, Jafar MT. Detecting malicious Dns queries over encrypted tunnels using statistical analysis and bi-directional recurrent neural networks. Karbala Int J Mod Sci. 2021;7(4):4.","journal-title":"Karbala Int J Mod Sci"},{"issue":"2","key":"1289_CR13","doi-asserted-by":"publisher","first-page":"551","DOI":"10.3390\/iot1020030","volume":"1","author":"DW Fernando","year":"2020","unstructured":"Fernando DW, Komninos N, Chen T. A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT. 2020;1(2):551\u2013604.","journal-title":"IoT"},{"key":"1289_CR14","doi-asserted-by":"publisher","first-page":"138345","DOI":"10.1109\/ACCESS.2021.3114148","volume":"9","author":"CM Hsu","year":"2021","unstructured":"Hsu CM, Yang CC, Cheng HH, Setiasabda PE, Leu JS. Enhancing file entropy analysis to improve machine learning detection rate of ransomware. IEEE Access. 2021;9:138345\u201351.","journal-title":"IEEE Access"},{"issue":"20","key":"1289_CR15","first-page":"3307","volume":"11","author":"B Yamany","year":"2022","unstructured":"Yamany B, Elsayed MS, Jurcut AD, Abdelbaki N, Azer MA. A new scheme for ransomware classification and clustering using static features. Electron (Basel). 2022;11(20):3307.","journal-title":"Electron (Basel)"},{"key":"1289_CR16","doi-asserted-by":"crossref","unstructured":"Adamu U, Awan I. Ransomware prediction using supervised learning algorithms. In: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE; 2019. pp. 57\u201363.","DOI":"10.1109\/FiCloud.2019.00016"},{"issue":"1","key":"1289_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.47738\/jads.v5i1.161","volume":"5","author":"IMM El Emary","year":"2024","unstructured":"El Emary IMM, Yaghi KA. Machine learning classifier algorithms for ransomware lockbit prediction. J Appl Data Sci. 2024;5(1):24\u201332.","journal-title":"J Appl Data Sci"},{"key":"1289_CR18","volume-title":"The evolution of ransomware","author":"K Savage","year":"2015","unstructured":"Savage K, Coogan P, Lau H. The evolution of ransomware. Mountain View: Symantec; 2015."},{"key":"1289_CR19","doi-asserted-by":"crossref","unstructured":"Malik V, Khanna A, Sharma N. Trends in ransomware attacks: analysis and future predictions. Int J Global Innovations Solutions (IJGIS). 2024.","DOI":"10.21428\/e90189c8.f2996624"},{"key":"1289_CR20","doi-asserted-by":"crossref","unstructured":"Warkentin N, Zhang Y, Frank R. The business of ransomware and its effects on business. J Cyber Secur Technol. 2025;1\u201331.","DOI":"10.1080\/23742917.2025.2454620"},{"issue":"54","key":"1289_CR21","doi-asserted-by":"publisher","first-page":"81279","DOI":"10.1007\/s11356-022-21410-8","volume":"29","author":"ESM El-Kenawy","year":"2022","unstructured":"El-Kenawy ESM, Zerouali B, Bailek N, Bouchouich K, Hassan MA, Almorox J, et al. Improved weighted ensemble learning for predicting the daily reference evapotranspiration under the semi-arid climate conditions. Environ Sci Pollut Res. 2022;29(54):81279\u201399.","journal-title":"Environ Sci Pollut Res"},{"key":"1289_CR22","doi-asserted-by":"publisher","first-page":"112026","DOI":"10.1016\/j.knosys.2024.112026","volume":"299","author":"V Mizdrakovic","year":"2024","unstructured":"Mizdrakovic V, Kljajic M, Zivkovic M, Bacanin N, Jovanovic L, Deveci M, et al. Forecasting bitcoin: decomposition aided long short-term memory based time series modeling and its explanation with Shapley values. Knowl Based Syst. 2024;299:112026.","journal-title":"Knowl Based Syst"},{"key":"1289_CR23","doi-asserted-by":"crossref","unstructured":"Mohamed A, Mahmood S. K-Nearest neighbors approach to analyze and predict air quality in Delhi. J Artif Intell Metaheuristics. 2025;no.:34\u201343.","DOI":"10.54216\/JAIM.090104"},{"issue":"2","key":"1289_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.54216\/MOR.030204","volume":"3","author":"EM El-kenawy","year":"2025","unstructured":"El-kenawy EM. A review of machine learning models for predicting air quality in urban areas. Metaheuristic Optim Rev. 2025;3(2):33\u201346.","journal-title":"Metaheuristic Optim Rev"},{"key":"1289_CR25","doi-asserted-by":"crossref","unstructured":"Samee NA, El-Kenawy ESM, Atteia G, Jamjoom MM, Ibrahim A, Abdelhamid AA, et al. Metaheuristic optimization through deep learning classification of COVID-19 in chest X-Ray images. Computers Mater Continua. 2022;73(2).","DOI":"10.32604\/cmc.2022.031147"},{"key":"1289_CR26","doi-asserted-by":"publisher","first-page":"122147","DOI":"10.1016\/j.eswa.2023.122147","volume":"238","author":"ESM El-Kenawy","year":"2024","unstructured":"El-Kenawy ESM, Khodadadi N, Mirjalili S, Abdelhamid AA, Eid MM, Ibrahim A. Greylag Goose optimization: nature-inspired optimization algorithm. Expert Syst Appl. 2024;238:122147.","journal-title":"Expert Syst Appl"},{"key":"1289_CR27","doi-asserted-by":"crossref","unstructured":"Bacanin N, Jovanovic L, Zivkovic M, Zivkovic T, Bisevac P, Dobrojevic M, et al. Parkinson\u2019s disease detection with deep long Short-term memory networks optimized by modified metaheuristic algorithm. Collective intelligence. CRC; 2024. pp. 204\u201329.","DOI":"10.1201\/9781032690711-9"},{"issue":"1","key":"1289_CR28","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1038\/s41598-024-83592-0","volume":"15","author":"AM Elshewey","year":"2025","unstructured":"Elshewey AM, Abed AH, Khafaga DS, Alhussan AA, Eid MM, El-Kenawy ESM. Enhancing heart disease classification based on Greylag Goose optimization algorithm and long short-term memory. Sci Rep. 2025;15(1):1277.","journal-title":"Sci Rep"},{"key":"1289_CR29","doi-asserted-by":"publisher","first-page":"107417","DOI":"10.1016\/j.bspc.2024.107417","volume":"102","author":"Z Tarek","year":"2025","unstructured":"Tarek Z, Alhussan AA, Khafaga DS, El-Kenawy ESM, Elshewey AM. A snake optimization algorithm-based feature selection framework for rapid detection of cardiovascular disease in its early stages. Biomed Signal Process Control. 2025;102:107417.","journal-title":"Biomed Signal Process Control"},{"issue":"1","key":"1289_CR30","doi-asserted-by":"publisher","first-page":"24489","DOI":"10.1038\/s41598-024-74475-5","volume":"14","author":"AM Elshewey","year":"2024","unstructured":"Elshewey AM, Alhussan AA, Khafaga DS, Elkenawy ESM, Tarek Z. EEG-based optimization of eye state classification using modified-BER metaheuristic algorithm. Sci Rep. 2024;14(1):24489.","journal-title":"Sci Rep"},{"issue":"1","key":"1289_CR31","doi-asserted-by":"publisher","first-page":"23368","DOI":"10.1038\/s41598-024-73559-6","volume":"14","author":"AM Elshewey","year":"2024","unstructured":"Elshewey AM, Osman AM. Orthopedic disease classification based on breadth-first search algorithm. Sci Rep. 2024;14(1):23368.","journal-title":"Sci Rep"},{"issue":"3","key":"1289_CR32","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1007\/s00521-024-10468-9","volume":"37","author":"N El-Rashidy","year":"2025","unstructured":"El-Rashidy N, Tarek Z, Elshewey AM, Shams MY. Multitask multilayer-prediction model for predicting mechanical ventilation and the associated mortality rate. Neural Comput Appl. 2025;37(3):1321\u201343.","journal-title":"Neural Comput Appl"},{"key":"1289_CR33","unstructured":"Wa Nkongolo MN. RFSA: A Ransomware feature selection algorithm for multivariate analysis of malware behavior in cryptocurrency. 2024."},{"key":"1289_CR34","doi-asserted-by":"crossref","unstructured":"Davies SR, Macfarlane R, Buchanan WJ. Differential area analysis for ransomware attack detection within mixed file datasets. Comput Secur [Internet]. 2021;108:102377. Available from: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821002017","DOI":"10.1016\/j.cose.2021.102377"},{"issue":"8","key":"1289_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-024-03454-4","volume":"5","author":"NKY Gurukala","year":"2024","unstructured":"Gurukala NKY, Verma DK. Feature selection using particle swarm optimization and Ensemble-based machine learning models for ransomware detection. SN Comput Sci. 2024;5(8):1\u201318.","journal-title":"SN Comput Sci"},{"key":"1289_CR36","unstructured":"Mowri RA, Siddula M, Roy K. A comparative performance analysis of explainable machine learning models with and without Rfecv feature selection technique towards ransomware classification. ArXiv Preprint arXiv:221204864. 2022."},{"key":"1289_CR37","doi-asserted-by":"publisher","first-page":"102659","DOI":"10.1016\/j.cose.2022.102659","volume":"116","author":"DW Fernando","year":"2022","unstructured":"Fernando DW, Komninos N. FeSA: feature selection architecture for ransomware detection under concept drift. Comput Secur. 2022;116:102659.","journal-title":"Comput Secur"},{"issue":"1","key":"1289_CR38","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","volume":"11","author":"J Li","year":"2024","unstructured":"Li J, Othman MS, Chen H, Yusuf LM. Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning. J Big Data. 2024;11(1):36.","journal-title":"J Big Data"},{"key":"1289_CR39","doi-asserted-by":"publisher","unstructured":"Salem AH, Azzam SM, Emam OE, Abohany AA. Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. J Big Data. 2024;11(1):105. Available from: https:\/\/doi.org\/10.1186\/s40537-024-00957-y","DOI":"10.1186\/s40537-024-00957-y"},{"key":"1289_CR40","doi-asserted-by":"crossref","unstructured":"Nkongolo M, Tokmak M. Ransomware detection using stacked autoencoder for feature selection. ArXiv Preprint arXiv:240211342. 2024.","DOI":"10.52549\/ijeei.v12i1.5109"},{"key":"1289_CR41","doi-asserted-by":"crossref","unstructured":"Li G, Wang S, Chen Y, Zhou J, Zhao Q. A hybrid framework for ransomware detection using deep learning and Monte Carlo tree search. 2024.","DOI":"10.31219\/osf.io\/cjyvb"},{"key":"1289_CR42","doi-asserted-by":"crossref","unstructured":"Alohali MA, Elsadig M, Al-Wesabi FN, Al Duhayyim M, Hilal AM, Motwakel A. Optimal deep learning based ransomware detection and classification in the internet of things environment. Comput Syst Sci Eng. 2023;46(3).","DOI":"10.32604\/csse.2023.036802"},{"key":"1289_CR43","unstructured":"UGRansome dataset [Internet]. Available from: https:\/\/www.kaggle.com\/datasets\/nkongolo\/ugransome-dataset"},{"key":"1289_CR44","unstructured":"Zahra SR, UGRansome. Optimal Approach for Anomaly Intrusion Detection and Zero-day Threats using Cloud Environment."},{"key":"1289_CR45","unstructured":"Igugu A. Evaluating the Effectiveness of AI and Machine Learning Techniques for Zero-Day Attacks Detection in Cloud Environments. 2024."},{"issue":"10","key":"1289_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11760-025-04396-x","volume":"19","author":"R Su","year":"2025","unstructured":"Su R. Generative mathematical models for ransomware attack prediction using Chi-Square feature selection for enhanced accuracy. Signal Image Video Process. 2025;19(10):1\u201317.","journal-title":"Signal Image Video Process"},{"key":"1289_CR47","doi-asserted-by":"crossref","unstructured":"Rios-Ochoa E, P\u00e9rez-D\u00edaz JA, Garcia-Ceja E, Rodriguez-Hernandez G. Ransomware family attribution with ML: A comprehensive evaluation of datasets quality, models comparison and a simulated deployment. IEEE Access. 2025.","DOI":"10.1109\/ACCESS.2025.3580395"},{"key":"1289_CR48","unstructured":"Torky B. Ensemble methods for the anomaly detection in enterprise systems. 2023."},{"issue":"1","key":"1289_CR49","first-page":"437","volume":"16","author":"S Mondal","year":"2024","unstructured":"Mondal S, Ghosh S, Nag A. Brain stroke prediction model based on boosting and stacking ensemble approach. Int J Inform Technol. 2024;16(1):437\u201346.","journal-title":"Int J Inform Technol"},{"key":"1289_CR50","doi-asserted-by":"crossref","unstructured":"Gandomi AH, Yang XS, Talatahari S, Alavi AH. Metaheuristic algorithms. Metaheuristic applications in structures and infrastructures. Elsevier Waltham; 2013. pp. 1\u201324.","DOI":"10.1016\/B978-0-12-398364-0.00001-2"},{"key":"1289_CR51","doi-asserted-by":"crossref","unstructured":"Benaissa B, Kobayashi M, Al Ali M, Khatir T, Elmeliani MEAE. Metaheuristic optimization algorithms: an overview. HCMCOU J Science\u2013Advances Comput Struct. 2024;33\u201361.","DOI":"10.46223\/HCMCOUJS.acs.en.14.1.47.2024"},{"key":"1289_CR52","doi-asserted-by":"crossref","unstructured":"Das AK, Pratihar DK. A new bonobo optimizer (BO) for real-parameter optimization. In: 2019 IEEE region 10 symposium (TENSYMP). IEEE; 2019. pp. 108\u201313.","DOI":"10.1109\/TENSYMP46218.2019.8971108"},{"key":"1289_CR53","doi-asserted-by":"publisher","first-page":"103541","DOI":"10.1016\/j.engappai.2020.103541","volume":"90","author":"S Kaur","year":"2020","unstructured":"Kaur S, Awasthi LK, Sangal AL, Dhiman G. Tunicate swarm algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Eng Appl Artif Intell. 2020;90:103541.","journal-title":"Eng Appl Artif Intell"},{"issue":"10","key":"1289_CR54","doi-asserted-by":"publisher","first-page":"5887","DOI":"10.1002\/int.22535","volume":"36","author":"B Abdollahzadeh","year":"2021","unstructured":"Abdollahzadeh B, Soleimanian Gharehchopogh F, Mirjalili S. Artificial Gorilla troops optimizer: a new nature-inspired metaheuristic algorithm for global optimization problems. Int J Intell Syst. 2021;36(10):5887\u2013958.","journal-title":"Int J Intell Syst"},{"issue":"4","key":"1289_CR55","doi-asserted-by":"publisher","first-page":"4327","DOI":"10.1007\/s41939-024-00476-6","volume":"7","author":"Y Wang","year":"2024","unstructured":"Wang Y, Xu S. 28-day compressive strength prediction utilizing a radial basis function model incorporating meta-heuristic algorithms. Multiscale Multidisciplinary Model Experiments Des. 2024;7(4):4327\u201342.","journal-title":"Multiscale Multidisciplinary Model Experiments Des"},{"key":"1289_CR56","doi-asserted-by":"crossref","unstructured":"Zheng R, Hussien AG, Bouaouda A, Zhong R, Hu G. A comprehensive review of the tunicate swarm algorithm: variations, applications, and results. Arch Comput Methods Eng. 2025;1\u201370.","DOI":"10.1007\/s11831-025-10228-5"},{"issue":"1","key":"1289_CR57","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s42835-023-01556-2","volume":"19","author":"H Zhang","year":"2024","unstructured":"Zhang H, Razmjooy N. Optimal Elman neural network based on improved Gorilla troops optimizer for short-term electricity price prediction. J Electr Eng Technol. 2024;19(1):161\u201375.","journal-title":"J Electr Eng Technol"},{"key":"1289_CR58","doi-asserted-by":"crossref","unstructured":"Bichri H, Chergui A, Hain M. Investigating the impact of train\/test split ratio on the performance of Pre-Trained models with custom datasets. Int J Adv Comput Sci Appl. 2024;15(2).","DOI":"10.14569\/IJACSA.2024.0150235"},{"key":"1289_CR59","doi-asserted-by":"crossref","unstructured":"Tamilarasi P, Rani RU. Diagnosis of crime rate against women using k-fold cross validation through machine learning. In: 2020 fourth international conference on computing methodologies and communication (ICCMC). IEEE; 2020. pp. 1034\u20138.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-000193"},{"issue":"3","key":"1289_CR60","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1007\/s00180-020-00999-9","volume":"36","author":"BG Marcot","year":"2021","unstructured":"Marcot BG, Hanea AM. What is an optimal value of k in k-fold cross-validation in discrete bayesian network analysis? Comput Stat. 2021;36(3):2009\u201331.","journal-title":"Comput Stat"},{"key":"1289_CR61","doi-asserted-by":"publisher","first-page":"103364","DOI":"10.1109\/ACCESS.2022.3210175","volume":"10","author":"B Van Stein","year":"2022","unstructured":"Van Stein B, Raponi E, Sadeghi Z, Bouman N, Van Ham RCHJ, B\u00e4ck T. A comparison of global sensitivity analysis methods for explainable AI with an application in genomic prediction. IEEE Access. 2022;10:103364\u201381.","journal-title":"IEEE Access"},{"key":"1289_CR62","first-page":"22","volume":"101","author":"B Iooss","year":"2015","unstructured":"Iooss B, Lema\u00eetre P. A review on global sensitivity analysis methods. Uncertain Manage simulation-optimization Complex Systems: Algorithms Appl. 2015;101:22.","journal-title":"Uncertain Manage simulation-optimization Complex Systems: Algorithms Appl"},{"key":"1289_CR63","doi-asserted-by":"crossref","unstructured":"Granados GE, Miorelli R, Gatti F, Clouteau D. A deep learning framework for efficient global sensitivity analysis and shap values calculations applied to eddy current testing problems. In: 50th annual review of progress in quantitative nondestructive evaluation. American Society of Mechanical Engineers; 2023. p. V001T10A001.","DOI":"10.1115\/QNDE2023-118352"},{"key":"1289_CR64","doi-asserted-by":"crossref","unstructured":"Derrac J, Garc\u00eda S, Molina D, Herrera F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput. 2011;1(1):3\u201318. Available from: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2210650211000034","DOI":"10.1016\/j.swevo.2011.02.002"},{"issue":"4","key":"1289_CR65","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1016\/0169-2070(89)90008-3","volume":"5","author":"BE Flores","year":"1989","unstructured":"Flores BE. The utilization of the Wilcoxon test to compare forecasting methods: A note. Int J Forecast. 1989;5(4):529\u201335.","journal-title":"Int J Forecast"},{"key":"1289_CR66","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1515\/jacsm-2017-0002","volume":"9","author":"VG Biju","year":"2017","unstructured":"Biju VG, Prashanth CM. Friedman and Wilcoxon evaluations comparing SVM, bagging, boosting, K-NN and decision tree classifiers. J Appl Comput Sci Methods. 2017;9:23\u201347.","journal-title":"J Appl Comput Sci Methods"},{"key":"1289_CR67","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang H, Xiao X, Mercaldo F, Ni S, Martinelli F, Sangaiah AK. Classification of ransomware families with machine learning based onN-gram of opcodes. Future Generation Comput Syst. 2019;90:211\u201321.","journal-title":"Future Generation Comput Syst"},{"key":"1289_CR68","doi-asserted-by":"crossref","unstructured":"Das AK, Pratihar DK. Optimal preventive maintenance interval for a Crankshaft balancing machine under reliability constraint using Bonobo Optimizer. In: Advances in Mechanism and Machine Science: Proceedings of the 15th IFToMM World Congress on Mechanism and Machine Science 15. Springer; 2019. pp. 1659\u201368.","DOI":"10.1007\/978-3-030-20131-9_164"},{"key":"1289_CR69","doi-asserted-by":"crossref","unstructured":"Farh HMH, Al-Shamma\u2019a AA, Al-Shaalan AM, Alkuhayli A, Noman AM, Kandil T. Technical and Economic Evaluation for Off-Grid Hybrid Renewable Energy System Using Novel Bonobo Optimizer. Sustainability 2022, 14, 1533. s Note: MDPI stays neu-tral with regard to jurisdictional claims in \u2026. 2022.","DOI":"10.3390\/su14031533"},{"issue":"3","key":"1289_CR70","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.3390\/su14031533","volume":"14","author":"HMH Farh","year":"2022","unstructured":"Farh HMH, Al-Shamma\u2019a AA, Al-Shaalan AM, Alkuhayli A, Noman AM, Kandil T. Technical and economic evaluation for off-grid hybrid renewable energy system using novel Bonobo optimizer. Sustainability. 2022;14(3):1533.","journal-title":"Sustainability"},{"key":"1289_CR71","doi-asserted-by":"publisher","first-page":"676805","DOI":"10.3389\/fevo.2021.676805","volume":"9","author":"JE Smith","year":"2021","unstructured":"Smith JE, von Rueden CR, van Vugt M, Fichtel C, Kappeler PM. An evolutionary explanation for the female leadership paradox. Front Ecol Evol. 2021;9:676805.","journal-title":"Front Ecol Evol"},{"issue":"11","key":"1289_CR72","doi-asserted-by":"publisher","first-page":"4407","DOI":"10.1007\/s10115-020-01503-x","volume":"62","author":"AK Das","year":"2020","unstructured":"Das AK, Nikum AK, Krishnan SV, Pratihar DK. Multi-objective Bonobo optimizer (MOBO): an intelligent heuristic for multi-criteria optimization. Knowl Inf Syst. 2020;62(11):4407\u201344.","journal-title":"Knowl Inf Syst"},{"issue":"8","key":"1289_CR73","first-page":"878","volume":"10","author":"A Sharma","year":"2021","unstructured":"Sharma A, Dasgotra A, Tiwari SK, Sharma A, Jately V, Azzopardi B. Parameter extraction of photovoltaic module using tunicate swarm algorithm. Electron (Basel). 2021;10(8):878.","journal-title":"Electron (Basel)"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01289-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01289-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01289-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:01:52Z","timestamp":1762207312000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01289-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":73,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1289"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01289-1","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"8 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The research paper has received ethical approval from the institutional review board, ensuring the protection of participants\u2019 rights and compliance with the relevant ethical guidelines.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"245"}}