# Mathematical Formulations

- [Formulas and Algorithms Used in Opcode Analysis and Threat Assessment](/whitepaper/mathematical-formulations/formulas-and-algorithms-used-in-opcode-analysis-and-threat-assessment.md)
- [Mathematical Rationale Behind the Machine Learning Algorithms Employed](/whitepaper/mathematical-formulations/formulas-and-algorithms-used-in-opcode-analysis-and-threat-assessment/mathematical-rationale-behind-the-machine-learning-algorithms-employed.md)
- [Theoretical Underpinnings of the System's Decision-Making Process](/whitepaper/mathematical-formulations/theoretical-underpinnings-of-the-systems-decision-making-process.md)
- [Presentation of the System's Performance in Detecting Malicious Opcodes](/whitepaper/mathematical-formulations/presentation-of-the-systems-performance-in-detecting-malicious-opcodes.md)
