Given the limitations and the methodological problems we mentioned earlier, in recent times we have increasingly resorted to new forms of detecting of suspicious user accounts using some forms of biometric recognition. These have been made more usable than in the past due to the increasing diffusion of neural networks.
The same user authentication procedures are often implemented through biometric recognition, which supplements (if not replaces) the most traditional forms of password-based authentication.
When we talk about biometric recognition, we can consider distinctive physical elements that can be reliably and exclusively traced back to a specific human user, such as the iris, face, fingerprints, voice, and more. Behaviors and habits can also be identified in patterns that may be reliably associated with the individual user...