“Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation ” (2022) International Journal of Innovative Research in Engineering & Management, 9(2), pp. 50–58. Available at: https://acspublisher.com/journals/index.php/ijirem/article/view/10916 (Accessed: 25 August 2024).