Algorithms

Algorithms

Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:

Tree & Graph algorithms

Adjacency Matrix

Dijkstra's Shortest Path

Tortoise And Hare algorithm

Borůvka's algorithm

Kruskal's algorithm

Prim's algorithm

Reverse-delete algorithm

ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees

Random Forest

Extra Trees

Parsers

Bitap algorithm

Dynamic Syntax Tree

LR parser

CYK algorithm

Deduplication Algorithm

Roslyn

Recursion

Dynamic Programming

Backtracking

Searching & Sorting

Optimal merge pattern

LIFO Search and FIFO search

Predictive search

Randomness

Randomized Algorithms

Karger's algorithm

Flow Networks

Dinic's algorithm

Bayesian Belief Networks

Sequences

Gibbs sampling

Hybrid Monte Carlo

Damerau–Levenshtein distance

Jaro–Winkler distance

MEX (minimal excluded) of a sequence

Software Architecture

Tomasulo algorithm

Dynamic scheduling

Byzantine fault tolerance

Distributed Ledger (DLT)

Cryptography & Encryption

Asymmetric (public key) encryption

Elliptic curve cryptography

SHA-3 (SHA-3 512)

Cryptographically secure pseudo-random number generators

Elliptic-curve Diffie–Hellman

HMAC

Advanced Encryption Standard (AES), also known as Rijndael

ML-KEM (FIPS 203) Post-quantum cryptography

Machine Learning

Self-organizing map

Bayesian Regression

Stepwise regression

Least-angle regression (LARS)

Sigmoid & Softmax functions

Lasso (L1 Regularization)

Ridge (L2 Regularization)

K-Nearest Neighbors (KNN)

Stochastic Gradient Descent

Boosting

Stacking

Naive Bayes

Gaussian Process Classification (GPC)

AI

Transformer-XL

Backpropagation

Multi-layer Perceptron (MLP)

Inference Scaling

Markov Desision Process (MDP)

Iterative Deepening Depth First Search

Iterative Deepening A* algorithm (IDA*)

Ant Colony Optimization (ACO)

Particle Swarm Optimization (PSO)

Levenshtein Distance (Edit Distance) Algorithm

Longest Common Subsequence (LCS) Algorithm

Stochastic Gradient Descent (SGD)

Ordinary Least Square (OLS) Regression

SARIMAX

Fuzzy C-Means (FCM) Clustering

DBSCAN (Density-Based Spatial Clustering of Applications with Noise)

OPTICS (Ordering Points to Identify the Clustering Structure)

ECLAT (Equivalence Class Clustering and bottom-up Lattice Traversal)

Z-Score

Local Outlier Factor (LOF)

Principal Component Analysis (PCA)

Non-negative Matrix Factorization (NMF)

Independent Component Analysis (ICA)

Locally Linear Embedding (LLE)

Latent Semantic Analysis (LSA)

EfficientNet CNN

Bidirectional RNN

Long Short-Term Memory (LSTM)

Gated Recurrent Unit (GRU)

Contractive Autoencoder (CAE)

Deep Q-Networks (DQN)

FastText

Sentiment Analysis using RNN

Seq2Seq Models for Text Summarization

Text Generation using RNN

Blockchain

Consensus Algorithms

Merkle tree

Zero-Knowledge Proofs (ZKPs)

Decision Tree

Decision Tree Classifier

Decision Tree Regressor

Classification Metrics

Confusion matrix

Accuracy

Precision

Recall

Specificity

F1 score

Area under the ROC curve (AUC-ROC)

Error Correction

BCJR algorithm

Reed-Solomon Codes

Auto-Bug-Repair

Bug Introducers Finder

Bug Fix patterns

 

Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.

 

 

COPYRIGHT (C) 2015-2025 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.