Algorithms

Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:

Tree & Graph algorithms

Adjacency Matrix

Dijkstra's Shortest Path

Tortoise And Hare algorithm

Borůvka's algorithm

Kruskal's algorithm

Prim's algorithm

Reverse-delete algorithm

ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees

Random Forest

Extra Trees

Parsers

Bitap algorithm

Dynamic Syntax Tree

LR parser

CYK algorithm

Deduplication Algorithm

Recursion

Dynamic Programming

Backtracking

Searching & Sorting

Optimal merge pattern

LIFO Search and FIFO search

Predictive search

Randomness

Randomized Algorithms

Karger's algorithm

Flow Networks

Dinic's algorithm

Bayesian Belief Networks

Sequences

Gibbs sampling

Hybrid Monte Carlo

Damerau–Levenshtein distance

Jaro–Winkler distance

MEX (minimal excluded) of a sequence

Software Architecture

Tomasulo algorithm

Dynamic scheduling

Byzantine fault tolerance

Distributed Ledger (DLT)

Cryptography & Encryption

Asymmetric (public key) encryption

Elliptic curve cryptography

SHA-3 (SHA-3 512)

Cryptographically secure pseudo-random number generators

Elliptic-curve Diffie–Hellman

HMAC

Advanced Encryption Standard (AES), also known as Rijndael

Post-quantum cryptography

Machine Learning

Self-organizing map

Bayesian Regression

Stepwise regression

Least-angle regression (LARS)

Sigmoid & Softmax functions

Lasso (L1 Regularization)

Ridge (L2 Regularization)

K-Nearest Neighbors (KNN)

Stochastic Gradient Descent

Boosting

Stacking

Naive Bayes

Gaussian Process Classification (GPC)

Blockchain

Consensus Algorithms

Merkle tree

Zero-Knowledge Proofs (ZKPs)

Decision Tree

Decision Tree Classifier

Decision Tree Regressor

Classification Metrics

Confusion matrix

Accuracy

Precision

Recall

Specificity

F1 score

Area under the ROC curve (AUC-ROC)

Error Correction

BCJR algorithm

Reed-Solomon Codes

Auto-Bug-Repair

Bug Introducers Finder

Bug Fix patterns

 

Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.

 

 

COPYRIGHT (C) 2015-2024 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.