/
Algorithms
Algorithms
Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:
Tree & Graph algorithms
ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees
Parsers
Recursion
Searching & Sorting
Randomness
Flow Networks
Sequences
MEX (minimal excluded) of a sequence
Software Architecture
Distributed Ledger (DLT)
Cryptography & Encryption
Asymmetric (public key) encryption
SHA-3 (SHA-3 512)
Cryptographically secure pseudo-random number generators
Advanced Encryption Standard (AES), also known as Rijndael
Machine Learning
Gaussian Process Classification (GPC)
Blockchain
Decision Tree
Classification Metrics
Area under the ROC curve (AUC-ROC)
Error Correction
Auto-Bug-Repair
Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.
, multiple selections available,
Related content
Community
Community
More like this
Knowledge Center
Knowledge Center
More like this
Security Reviewer Suite
Security Reviewer Suite
More like this
Cloud Reviewer
Cloud Reviewer
More like this
Enhancement Request Process and Policy
Enhancement Request Process and Policy
More like this
FAQ
More like this
COPYRIGHT (C) 2015-2025 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.