Latest version: v1.0.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This library was created in order to evaluate the effectiveness of any kind of algorithm used in IR systems and analyze how well they perform.
No known vulnerabilities found