August 2019
Intermediate to advanced
342 pages
9h 35m
English
Given the limitations and the methodological problems we mentioned earlier, in recent times we have increasingly resorted to new forms of detecting of suspicious user accounts using some forms of biometric recognition. These have been made more usable than in the past due to the increasing diffusion of neural networks.
The same user authentication procedures are often implemented through biometric recognition, which supplements (if not replaces) the most traditional forms of password-based authentication.
When we talk about biometric recognition, we can consider distinctive physical elements that can be reliably and exclusively traced back to a specific human user, such as the iris, face, fingerprints, ...
Read now
Unlock full access