Finally, the paper concludes with a number of challenges intrinsic and specific to the domain of security in the Cyberworlds. [...] The expectations on biometric Biometric-Based Authentication for Cyberworld Security: Challenges and Opportunities Page 1 by M. L. Gavrilova May, 2014 Biometric-Based Authentication for Cyberworld Security method performance largely depends on the size of the dataset, quality of samples, sensor quality, type and number of biometrics being used, and the type of application domains [5]. [...] The first branch encompasses works on program understanding and risk analysis, scrutinizing the source code of the program with the goal of understanding the original purpose and ensuring it does not contain malicious code [15,18,20]. [...] It also contains research on robot behaviour recognition and prediction, focusing on recognition of specific instances of behaviour and estimating the degree to which a threat may be present, and includes works on robot detection and robot self-recognition [6,15,18,20]. [...] As the physical and the virtual world come closer, the distinction between the two begins to fade and the urgent need for a security system capable of working in both contexts arises.