Algorithms
Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:
Tree & Graph algorithms
ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees
Parsers
Recursion
Searching & Sorting
Randomness
Flow Networks
Sequences
MEX (minimal excluded) of a sequence
Software Architecture
Distributed Ledger (DLT)
Cryptography & Encryption
Asymmetric (public key) encryption
SHA-3 (SHA-3 512)
Cryptographically secure pseudo-random number generators
Advanced Encryption Standard (AES), also known as Rijndael
ML-KEM (FIPS 203) Post-quantum cryptography
Machine Learning
Gaussian Process Classification (GPC)
AI
Iterative Deepening Depth First Search
Iterative Deepening A* algorithm (IDA*)
Particle Swarm Optimization (PSO)
Levenshtein Distance (Edit Distance) Algorithm
Longest Common Subsequence (LCS) Algorithm
Stochastic Gradient Descent (SGD)
Ordinary Least Square (OLS) Regression
Fuzzy C-Means (FCM) Clustering
DBSCAN (Density-Based Spatial Clustering of Applications with Noise)
OPTICS (Ordering Points to Identify the Clustering Structure)
ECLAT (Equivalence Class Clustering and bottom-up Lattice Traversal)
Principal Component Analysis (PCA)
Non-negative Matrix Factorization (NMF)
Independent Component Analysis (ICA)
Locally Linear Embedding (LLE)
Latent Semantic Analysis (LSA)
EfficientNet CNN
Seq2Seq Models for Text Summarization
Blockchain
Decision Tree
Classification Metrics
Area under the ROC curve (AUC-ROC)
Error Correction
Auto-Bug-Repair
Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.
COPYRIGHT (C) 2015-2025 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.