Algorithms
Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:
Tree & Graph algorithms
ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees
Parsers
Recursion
Searching & Sorting
Randomness
Flow Networks
Sequences
Damerau–Levenshtein distance
MEX (minimal excluded) of a sequence
Software Architecture
Distributed Ledger (DLT)
Cryptography & Encryption
Asymmetric (public key) encryption
SHA-3 (SHA-3 512)
Cryptographically secure pseudo-random number generators
Elliptic-curve Diffie–Hellman
Advanced Encryption Standard (AES), also known as Rijndael
Machine Learning
Gaussian Process Classification (GPC)
Blockchain
Decision Tree
Classification Metrics
Area under the ROC curve (AUC-ROC)
Error Correction
Auto-Bug-Repair
Â
Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.
Â
Â
COPYRIGHT (C) 2015-2024 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.