Aitken, M., & Comerton-Forde, C. (2003). How should liquidity be measured?. Pacific-Basin Finance Journal, 11(1), pp. 45–59.
Berger, A. J., Glover, F., & Mulvey, J. M. (1995). Solving global optimization problems in long-term financial planning. Statistics and Operation Research Technical Report, Princeton University.
Bouchaud, J. P., & Potters, M. (2003). Theory of financial risk and derivative pricing: from statistical physics to risk management. Cambridge university press.
Chang, T. J., Yang, S. C., & Chang, K. J. (2009). Portfolio optimization problems in different risk measures using genetic algorithm. Expert Systems with Applications, 36(7), 10529–10537.
Chen, L. H., & Huang, L. (2009). Portfolio optimization of equity mutual funds with fuzzy return rates and risks. Expert Systems with Applications, 36(2), 3720–3727.
Florackis, C., Kontonikas, A., & Kostakis, A. (2014). Stock market liquidity and macro-liquidity shocks: Evidence from the 2007–2009 financial crisis. Journal of International Money and Finance, 44, 97–117.
Galariotis, E. C., Krokida, S. I., & Spyrou, S. I. (2016). Herd behavior and equity market liquidity: Evidence from major markets. International Review of Financial Analysis, 48, 140–149.
Garkaz, M. (2011). The selection and optimization of stock portfolio using genetic algorithm based on mean-semi variance model. In International Conference on Economics and Finance Research, IPEDR, LASSIT Press, Singapore (No. 4, pp. 379–381).
Gundare, F. R., & Sharabiani, A. A. A. (2014). Utilization of bid-asked spread model and liquidity in explanation of excess stock returns. International Journal of Management, IT and Engineering, 4(5), 227.
Lai, K. K., Yu, L., Wang, S., & Zhou, C. (2006, October). A double-stage genetic optimization algorithm for portfolio selection. In International Conference on Neural Information Processing (pp. 928–937). Springer, Berlin, Heidelberg.
Luo, G. L., Long, C. F., Wei, X., & Tang, W. J. (2016). Financing risks involved in distributed PV power generation in China and analysis of countermeasures. Renewable and Sustainable Energy Reviews, 63, 93–101.
Marshall, B. R. (2006). Liquidity and stock returns: Evidence from a pure order-driven market using a new liquidity proxy. International Review of Financial Analysis, 15(1), 21–38.
Moghadam, M. R. V., Afshar, K., & Bigdeli, N. (2011, August). A New Hybrid Method for Short-term Price Forecasting in Iran Electricity Market. In 2011 International Conference on Management and Service Science (pp. 1–4). IEEE.
Mohagheghnia, M. J., & Heidari, S. (2014). To Study the Effect of Management Earnings Forecasts in Risk and Value of the Firms Listed on Tehran Stock Exchange. Kuwait Chapter of Arabian Journal of Business and Management Review, 33(2538), 1–16.
Mulvey, J. M., Rosenbaum, D. P., & Shetty, B. (1997). Strategic financial risk management and operations research. European Journal of Operational Research, 97(1), 1–16.
Ross, S. A., Westerfield, R., Jordan, B. D., & Firer, C. (2000). Fundamentals of corporate finance. Boston, MA: Irwin/McGraw-Hill.
Simon Hodrick, L., & Moulton, P. (2007). Liquidity: Considerations of a Portfolio Manager.
Soleimani, H., Golmakani, H. R., & Salimi, M. H. (2009). Markowitz-based portfolio selection with minimum transaction lots, cardinality constraints and regarding sector capitalization using genetic algorithm. Expert Systems with Applications, 36(3), 5058–5063.
Subrahmanyam, A. (2009). The implications of liquidity and order flows for neoclassical finance. Pacific-Basin Finance Journal, 17(5), 527–532.
Venturelli, D., & Kondratyev, A. (2019). Reverse quantum annealing approach to portfolio optimization problems. Quantum Machine Intelligence, 1(1–2), 17–30.
Zarranezhad, M., Hajiabad, R. Y., & Fakherinia, M. (2015). Evaluation of Particle Swarm Algorithm and Genetic Algorithms Performance at Optimal Portfolio Selection. Asian Economic and Financial Review, 5(1), 88–101.
Zhang, W. G., Chen, W., & Wang, Y. L. (2006). The adaptive genetic algorithms for portfolio selection problem. IJCSNS International Journal of Computer Science and Network Security, 6(1), 196–200.