{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:10:58Z","timestamp":1749010258453,"version":"3.41.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04043-9","type":"journal-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T12:24:23Z","timestamp":1748953463000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RAG-Enhanced Spam Detection Framework: A Synergy of Cloud Scalability and Adaptive AI Models"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2839-3646","authenticated-orcid":false,"given":"Ashish","family":"Revar","sequence":"first","affiliation":[]},{"given":"Bhavin","family":"Bhesaniya","sequence":"additional","affiliation":[]},{"given":"Kalpesh","family":"Wandra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"issue":"5","key":"4043_CR1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MIC.2004.41","volume":"8","author":"J Goodman","year":"2004","unstructured":"Goodman J, Cormack GV, Heckerman D. Filtering unwanted email: a survey of techniques. IEEE Internet Comput. 2004;8(5):30\u20138.","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"4043_CR2","first-page":"15","volume":"34","author":"TA Almeida","year":"2011","unstructured":"Almeida TA, Hidalgo JMG, Yamakami A. Combining classifiers for efficient spam filtering. Int J Comput Appl. 2011;34(1):15\u201322.","journal-title":"Int J Comput Appl"},{"issue":"11","key":"4043_CR3","first-page":"5223","volume":"29","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Liu J, Zhao T. CNN-based solutions for email spam detection. IEEE Trans Neural Netw Learning Syst. 2018;29(11):5223\u201335.","journal-title":"IEEE Trans Neural Netw Learning Syst"},{"key":"4043_CR4","unstructured":"Malhotra, P., and Malik, S. (2022). Machine learning approaches to spam email classification. Proceedings of the international conference on innovative computing and communication, 129\u2013139."},{"issue":"4","key":"4043_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, et al. Cloud computing: opportunities and challenges. Commun ACM. 2010;53(4):50\u20138.","journal-title":"Commun ACM"},{"issue":"3","key":"4043_CR6","first-page":"180","volume":"2","author":"Y Wu","year":"2014","unstructured":"Wu Y, Jiang M, Wang L. Employing cloud resources for real-time spam classification. IEEE Trans Cloud Comput. 2014;2(3):180\u201392.","journal-title":"IEEE Trans Cloud Comput"},{"key":"4043_CR7","doi-asserted-by":"publisher","unstructured":"Chang, V. (2020). \u201dA Proposed Framework for Cloud Computing Adoption. https:\/\/doi.org\/10.4018\/978-1-5225-9615-8.ch044.","DOI":"10.4018\/978-1-5225-9615-8.ch044"},{"key":"4043_CR8","first-page":"67","volume":"127","author":"C-F Tsai","year":"2019","unstructured":"Tsai C-F, Lin W-C, Chen Y-H. Merging machine learning and cloud infrastructure for spam detection. J Netw Comput Appl. 2019;127:67\u201378.","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"4043_CR9","first-page":"47","volume":"15","author":"R Li","year":"2020","unstructured":"Li R, Wang Y, Zhang X. Hybrid spam detection methods leveraging cloud computing. Cybersecurity Privacy J. 2020;15(2):47\u201358.","journal-title":"Cybersecurity Privacy J"},{"issue":"2","key":"4043_CR10","first-page":"75","volume":"35","author":"T Sultana","year":"2020","unstructured":"Sultana T, Chakraborty M. Adaptive machine learning methods for spam detection. Int J Eng Res. 2020;35(2):75\u201384.","journal-title":"Int J Eng Res"},{"key":"4043_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, N., Pandey, R., and Gupta, S. (2020). A comparative analysis of email spam detection using machine learning algorithms. Proceedings of the international conference on innovative computing and communication, 85\u201393.","DOI":"10.1109\/ICIRCA48905.2020.9183098"},{"key":"4043_CR12","unstructured":"Wolf, T., Debut, L., Sanh, V., et al. (2020). NLP with transformers: an introduction. arXiv preprint arXiv:1910.03771."},{"key":"4043_CR13","doi-asserted-by":"publisher","first-page":"185401","DOI":"10.1109\/ACCESS.2024.3513155","volume":"12","author":"B Saha","year":"2024","unstructured":"Saha B, Saha U. Enhancing RAG frameworks with inverted ques- tion matching: QuIM-RAG. IEEE Access. 2024;12:185401\u201310. https:\/\/doi.org\/10.1109\/ACCESS.2024.3513155.","journal-title":"IEEE Access"},{"key":"4043_CR14","doi-asserted-by":"publisher","unstructured":"Alshammary, M., Uddin, M. N., and Khan, L. (2024). Retrieval-augmented systems for low-resource languages. In: Proceedings of the IEEE international conference on collaboration and internet computing (CIC), pp. 107\u2013116. https:\/\/doi.org\/10.1109\/CIC62241.2024.00023.","DOI":"10.1109\/CIC62241.2024.00023"},{"key":"4043_CR15","doi-asserted-by":"publisher","unstructured":"Du, Y., Wang, Z., and Pei, Y. (2024). Biomedical applications of RAG: A knowledge-enhanced framework. In: Proceedings of the IEEE international conference on bioinformatics and biomedicine (BIBM), pp. 3188\u20133191. https:\/\/doi.org\/10.1109\/BIBM62325.2024.10822837.","DOI":"10.1109\/BIBM62325.2024.10822837"},{"key":"4043_CR16","doi-asserted-by":"publisher","unstructured":"Shi, Z., Bai, S., and Ma, X. (2024). Metadata retrieval in RAG-based systems for cloud applications. In Proceedings of the IEEE international conference on web services (ICWS), pp. 100\u2013107. https:\/\/doi.org\/10.1109\/ICWS62655.2024.00029.","DOI":"10.1109\/ICWS62655.2024.00029"},{"key":"4043_CR17","doi-asserted-by":"publisher","unstructured":"Bag, S., Gupta, A., and Jain, C. (2024). Expanding RAG capabilities for multi- modal data retrieval. In: Proceedings of the international conference on electrical, computer, and energy technologies (ICECET), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICECET61485.2024.10698598.","DOI":"10.1109\/ICECET61485.2024.10698598"},{"issue":"4","key":"4043_CR18","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1561\/1500000006","volume":"1","author":"GV Cormack","year":"2007","unstructured":"Cormack GV. A systematic review of methodologies for spam filtering. Found Trends Inf Retr. 2007;1(4):335\u2013455.","journal-title":"Found Trends Inf Retr"},{"key":"4043_CR19","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K. V., et al. (2000). Evaluation of Bayesian models for email spam detection. In: Workshop on machine learning in the new information age, pp. 9\u201317."},{"key":"4043_CR20","unstructured":"Sahami, M., Dumais, S., and Horvitz, E. (1998). Bayesian techniques for junk email filtering. In: AAAI workshop on learning for text categorization, pp. 55\u201362."},{"key":"4043_CR21","unstructured":"Carreras, X., and Marquez, L. (2001). Spam email filtering using boosting techniques. In: RANLP 2001: recent advances in natural language processing."},{"issue":"7","key":"4043_CR22","doi-asserted-by":"publisher","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"TS Guzella","year":"2009","unstructured":"Guzella TS, Caminhas WM. Machine learning and hybrid approaches to spam detection. Expert Syst Appl. 2009;36(7):10206\u201322.","journal-title":"Expert Syst Appl"},{"key":"4043_CR23","first-page":"1","volume-title":"Advances in multi-classifier systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich TG. Ensemble learning methods for classification problems. In: Advances in multi-classifier systems. Springer; 2000. p. 1\u201315."},{"key":"4043_CR24","unstructured":"Bratko, A., and Cormack, G. V. (2006). Comparative studies of batch and online spam filtering methods. In: CEAS 2006: proceedings of the third conference on email and anti-spam."},{"issue":"3","key":"4043_CR25","first-page":"45","volume":"47","author":"N Jain","year":"2022","unstructured":"Jain N, Sharma BK. Preprocessing techniques for enhanced spam detection. Int J Mech Eng. 2022;47(3):45\u201355.","journal-title":"Int J Mech Eng"},{"issue":"2","key":"4043_CR26","first-page":"123","volume":"59","author":"MA Ali","year":"2022","unstructured":"Ali MA, Lokhande S. Comparative analysis of spam email detection approaches. J Xi\u2019an Shiyou Univ. 2022;59(2):123\u201334.","journal-title":"J Xi\u2019an Shiyou Univ"},{"key":"4043_CR27","unstructured":"Fawcett, T. (2004). ROC analysis in research: applications to spam filtering. Technical report HPL-2003\u20134, HP laboratories."},{"issue":"6","key":"4043_CR28","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1016\/j.comnet.2008.11.012","volume":"53","author":"MN Marsono","year":"2009","unstructured":"Marsono MN, El-Kharashi MW, Gebali F. Layer-3 email spam filtering: a middlebox approach. Comput Netw. 2009;53(6):835\u201348.","journal-title":"Comput Netw"},{"key":"4043_CR29","unstructured":"Amazon Web Services. (2022). Overview of the AWS cloud adop-tion framework. Retrieved from: https:\/\/docs.aws.amazon.com\/pdfs\/whitepapers\/latest\/overview-aws-cloud-adoption-framework\/overview-aws-cloud-adoption-framework.pdf."},{"issue":"4","key":"4043_CR30","first-page":"123","volume":"8","author":"I Androutsopoulos","year":"2000","unstructured":"Androutsopoulos I, Koutsias J, Spyropoulos CD. Naive Bayesian spam filtering revisited. Foundations Comput Syst. 2000;8(4):123\u201332.","journal-title":"Foundations Comput Syst"},{"key":"4043_CR31","doi-asserted-by":"publisher","unstructured":"Sawarkar, K., Mangal, A., and Solanki, S. R. (2024). \u201dBlended RAG: improving RAG (Retriever-augmented generation) accuracy with semantic search and hybrid query-based retrievers.\u201d In: 2024 IEEE 7th international conference on multimedia information processing and retrieval (MIPR), pp. 155\u2013161. https:\/\/doi.org\/10.1109\/MIPR62202.2024.00031.","DOI":"10.1109\/MIPR62202.2024.00031"},{"key":"4043_CR32","doi-asserted-by":"publisher","unstructured":"Bag, S., Gupta, A., Kaushik, R., and Jain, C. (2024). \u201dRAG beyond text: enhancing image retrieval in RAG systems.\u201d In: 2024 international conference on electrical, computer and energy technologies (ICECET), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICECET61485.2024.10698598.","DOI":"10.1109\/ICECET61485.2024.10698598"},{"key":"4043_CR33","doi-asserted-by":"publisher","unstructured":"Du, Y., Wang, Z., Wang, B., Jin, X., and Pei, Y. (2024). \u201dA novel RAG frame- work with knowledge-enhancement for biomedical question answering.\u201d In: 2024 IEEE international conference on bioinformatics and biomedicine (BIBM), pp. 3188\u20133191. https:\/\/doi.org\/10.1109\/BIBM62325.2024.10822837.","DOI":"10.1109\/BIBM62325.2024.10822837"},{"key":"4043_CR34","doi-asserted-by":"publisher","unstructured":"Sokolov, A. P., Zamelin, P., Kamelina, Y., and Plastova, P. (2024). \u201dGenerative reader optimization in the RAG-system.\u201d In: 2024 V international conference on neural networks and neurotechnologies (NeuroNT), pp. 135\u2013138. https:\/\/doi.org\/10.1109\/NeuroNT62606.2024.10585446.","DOI":"10.1109\/NeuroNT62606.2024.10585446"},{"key":"4043_CR35","doi-asserted-by":"publisher","first-page":"185401","DOI":"10.1109\/ACCESS.2024.3513155","volume":"12","author":"B Saha","year":"2024","unstructured":"Saha B, Saha U, Malik MZ. QuIM-RAG: advancing retrieval- augmented generation with inverted question matching for enhanced QA performance. IEEE Access. 2024;12:185401\u201310. https:\/\/doi.org\/10.1109\/ACCESS.2024.3513155.","journal-title":"IEEE Access"},{"key":"4043_CR36","doi-asserted-by":"publisher","unstructured":"Alshammary, M., Uddin, M. N., and Khan, L. (2024). \u201dRFPG: Question\u2013answering from low-resource language (arabic) texts using factually aware RAG.\u201d In: Proceedings of the 2024 IEEE 10th international conference on collaboration and internet computing (CIC), pp. 107\u2013116. https:\/\/doi.org\/10.1109\/CIC62241.2024.00023.","DOI":"10.1109\/CIC62241.2024.00023"},{"key":"4043_CR37","doi-asserted-by":"publisher","unstructured":"Shi, Z.-F., Liu, K., Bai, S., Jiang, Y.-T., Huo, T., Jing, X., Li, R.-Z., and Ma, X.-J. (2024). \u201dMeta data retrieval for data infrastructure via RAG.\u201d In: Proceedings of the 2024 IEEE international conference on web services (ICWS), pp. 100\u2013107. https:\/\/doi.org\/10.1109\/ICWS62655.2024.00029.","DOI":"10.1109\/ICWS62655.2024.00029"},{"key":"4043_CR38","doi-asserted-by":"publisher","unstructured":"Qiu, H., White, B., Ding, A., Costa, R., Hachem, A., Ding, W., and Chen, P. (2024). \u201dSteLLA: a structured grading system using LLMs with RAG.\u201d In: Proceedings of the 2024 IEEE international conference on big data (BigData), pp. 8154\u20138163. https:\/\/doi.org\/10.1109\/BigData62323.2024.10825385.","DOI":"10.1109\/BigData62323.2024.10825385"},{"key":"4043_CR39","doi-asserted-by":"publisher","unstructured":"Amato, F., Cirillo, E., Fonisto, M., and Moccardi, A. (2024). \u201dOptimizing legal information access: federated search and RAG for secure AI-powered legal solutions.\u201d In: Proceedings of the 2024 IEEE international conference on big data (BigData), pp. 7632\u20137639. https:\/\/doi.org\/10.1109\/BigData62323.2024.10825815.","DOI":"10.1109\/BigData62323.2024.10825815"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04043-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04043-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04043-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T12:24:29Z","timestamp":1748953469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04043-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,3]]},"references-count":39,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["4043"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04043-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,3]]},"assertion":[{"value":"30 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that there are no conflicts of interest related to the publication of this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This study does not involve experiments on humans or animals carried out by the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This research does not involve any experiments with human participants or animals and therefore does not require ethical approval.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Not applicable as no human participants were involved in this study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"516"}}