/
Algorithms
Algorithms
Security Reviewer’s Suite makes use of a large number of third-party algorithms. The following is a (partial) list:
Tree & Graph algorithms
ID3 algorithm (Iterative Dichotomiser 3): use heuristic to generate small decision trees
Parsers
Recursion
Searching & Sorting
Randomness
Flow Networks
Sequences
MEX (minimal excluded) of a sequence
Software Architecture
Distributed Ledger (DLT)
Cryptography & Encryption
Asymmetric (public key) encryption
SHA-3 (SHA-3 512)
Cryptographically secure pseudo-random number generators
Advanced Encryption Standard (AES), also known as Rijndael
Machine Learning
Gaussian Process Classification (GPC)
Blockchain
Decision Tree
Classification Metrics
Area under the ROC curve (AUC-ROC)
Error Correction
Auto-Bug-Repair
Our products make use of 3rd-party Open Source software, with different licenses. See the related Open Source section.
, multiple selections available,
Related content
Knowledge Center
Knowledge Center
More like this
New Features - Enhancements
New Features - Enhancements
More like this
Manuals and Guides
Manuals and Guides
More like this
Community
Community
More like this
FAQ
More like this
Quality Reviewer
Quality Reviewer
More like this
COPYRIGHT (C) 2015-2025 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.