Techniques and methods for obtaining access to data protected by linux-based encryption - A reference guide for practitioners.
Benjamin FindlayPublished in: Forensic Sci. Int. Digit. Investig. (2024)
Keyphrases
- statistical methods
- data sets
- data mining methods
- data mining techniques
- data processing
- missing values
- data analysis
- significant improvement
- data collection
- statistical analysis
- noisy data
- human experts
- high dimensional data
- preprocessing
- original data
- data mining
- missing data
- computer systems
- database
- training data
- knowledge discovery
- operating system
- real world
- dimensionality reduction
- open source
- databases
- data protection