International Journal of Information Security, 2024, 23, 2939–2949, doi: 10.1007/s10207-024-00871-7.
[3] A. Venckauskas, J. Toldinas, N. Morkevicius, F. Sanfilippo, An email cyber threat intelligence method using domain
ontology and machine learning, Electronics, 2024, 13, 2716, doi: 10.3390/electronics13142716.
[4] F. Wang, J. Tian, J. Ling, Z. Chen, Z. Xu, A multi-stage resilience analysis framework of critical infrastructure
systems based on component importance measures, Reliability Engineering System Safety, 2025, 256, 110720, doi:
10.1016/j.ress.2024.110720.
[5] C. Curt, J.-M. Tacnet, Resilience of critical infrastructures: review and analysis of current approaches: resilience
of critical infrastructures, Risk Analysis, 2018, 38, 2018, doi: 10.1111/risa.13166.
[6] D. Piedrahita, J. Bermejo, F. Machio, A secure email solution based on blockchain, Blockchain and Applications,
Lecture Notes in Networks and Systems, Springer, 2022, 320, doi: 10.1007/978-3-030-86162-9_36.
[7] J. N. Al-Karaki, A. Gawanmeh, C. Fachkha, Blockchain for email security: a perspective on existing and potential
solutions for phishing attacks, IEEE Fifth International Conference on Blockchain Computing and Applications
(BCCA), Kuwait, 2023, doi: 10.1109/BCCA58897.2023.10338865.
[8] R. Gupta, A. Raghuwanshi, Comparative study of email spam filtration using machine leaning algorithms,
International Journal of Science and Research, 2023, doi: 10.21275/sr23827122535.
[9] A. K.Sharma, S. Sahni, A comparative study of classification algorithms for spam email data analysis, International
Journal on Computer Science and Engineering, 2011, 3, 1890-1895.
[10] V. K. Devendran, H. Shahriar, V. Clincy, A comparative study of email forensic tools, Journal of Information
Security, 2025, 6, 111-117, doi: 10.4236/jis.2015.62012.
[11] S. M. Abdulhamid, M. Shuaib, O. Osho, Comparative analysis of classification algorithms for email spam
detection, International Journal of Computer Network and Information Security, 2028, 1, 60-67, doi:
10.5815/ijcnis.2018.01.07.
[12] T. Muralidharan, N, Nissim, Improving malicious email detection through novel designated deep-learning
architectures utilizing entire email, Neural Networks, 2023, 157, 257-279, doi: 10.1016/j.neunet.2022.09.002.
[13] D. K. Yadav, A.Raj, Rajlakshmi, N.Kumar, R. Kumari, Enhancing email security: a real-time machine learning-
based spam detection system, Internet Technology Letters, 2024, e618, doi: 10.1002/itl2.618.
[14] E. G. Dada, J. S. Bassi, H. Chiroma, S. M. Abdulhamid, A. O. Adetunmbi, O. E. Ajibuwa, Machine learning for
email spam filtering: review, approaches and open research problems, Heliyon, 2019, 5, e01802, doi:
10.1016/j.heliyon.2019.e01802.
[15] R. Fatima, M. M. Sadiq Fareed, S. Ullah, G. Ahmad, S. Mahmood, An optimized approach for detection and
classification of spam email’s using ensemble methods, Wireless Personal Communications, 2024, 139, 347–373, doi:
10.1007/s11277-024-11628-9.
[16] S. K. Birthriya, P. Ahlawat, A. K. Jain, An efficient spam and phishing email filtering approach using deep learning
and bio-inspired particle swarm optimization, International Journal of Computing and Digital Systems, 2024, 15, doi:
10.12785/ijcds/150144.
[17] N. Elisa, L. Yang, F. Chao, N. Naik, “TOSSAPON BOONGOEN secure and privacy-preserving e-government
framework using blockchain and artificial immunity, IEEE Access, 2023, 11, 8773-8789, doi:
10.1109/ACCESS.2023.3239814.
[18] C. Lambrinoudakis, S. Gritzalis, F. Dridi, G. Pernul, Security requirements for e-government services: a
methodological approach for developing a common PKI-based security policy, Computer Communications, 2003, 26,
1873-1883, doi:10.1016/S0140-3664(03)00082-3.
[19] F. A. Rawdhan, M. K. Ibrahim, enhancement of email security services, International Journal of Scientific &
Engineering Research, 2017, 8, 2090-2095.
[20] S. Choudhary, R. Ghusinga, E-mail security: issues and solutions, International Journal of Computer Information
Systems, 2013, 7, 42-63.
[21] S. K. Devineni, AI in data privacy and security, International Journal of Artificial Intelligence and Machine
Learning, 2024, 3, 35-39, doi: 10.17605/OSF.IO/WCN8A.
[22] P. Mwiinga, Privacy-preserving technologies: balancing security and user privacy in the digital age, International
Journal of Scientific and Research Publications, 2023, doi: 10.5281/zenodo.10406538.
[23] A. Reuter, K. Boudaoud, M. Winckler, A. Abdelmaksoud, W. Lemrazzeq, Secure Email - a usability study,
Cryptography and Security, 2021, doi: 10.48550/arXiv.2110.06019.
[24] E. Nunes, Email security, Trends in Data Protection and Encryption Technologies, 2023, doi: 10.1007/978-3-031-
33386-6_36.
[25] M. Maass, M-P. Clement, M. Hollick, Snail mail beats email any day: on effective operator security notifications
in the internet, In Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES
'21). Association for Computing Machinery, New York, USA, 2021, 11, 1–13, 2021, doi: 10.1145/3465481.3465743.
[26] Y. Chen, Y. Yang, An advanced deep attention collaborative mechanism for secure educational email services,