{"id":5570,"date":"2021-02-16T18:42:11","date_gmt":"2021-02-16T17:42:11","guid":{"rendered":"https:\/\/kinit.sk\/member\/daniela-chuda\/"},"modified":"2025-10-15T15:39:19","modified_gmt":"2025-10-15T13:39:19","slug":"daniela-chuda","status":"publish","type":"member","link":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/","title":{"rendered":"Daniela Chud\u00e1"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph\">\n<p>Daniela focuses on information security, privacy, behavioral biometrics in the context of user authentication, similarity of texts and detection of misinformation. She concentrates on advanced methods of user modeling and feature engineering. <\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>She headed up the PoWeR research group at FIIT STU, where machine learning techniques have been utilized, and has authored or co-authored more than 50 publications in scientific journals and conferences. She has participated as an investigator in more than 15 national and international research projects, focusing on e-learning, user modeling, misinformation and plagiarism detection in texts and programming code detection. She reviews submissions for renowned international conferences and scientific journals. <\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>She was a vice-dean for Bachelor\u2019s, Master\u2019s and PhD study and mobility at FIIT STU between 2011 and 2019. She is a member of ACM, a vice chair of ACM Slovakia and a member of the executive committee of the Slovak Society for Computer Science.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"selected-activities\">Selected activities<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Member of ACM,<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Vice chair of ACM Slovakia,<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Member of executive committee of Slovak Society for Computer Science,<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Activities in the past:<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Vice-dean responsible for study at FIIT STU<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Guarantor of the PhD study at FIIT STU<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Guarantor of the Bc study programme Information Security at FIIT STU<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Member of the Scientific Board of FIIT STU<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Reviewer of dissertation theses<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"professional-service\">Professional Service<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><strong>Reviews<\/strong>:<br>Journals: JCAL, COMSIS, Computer Journal, IJHCITP, AHCI, Computer Applications in Engineering Education, Computers, JICMS<br>Projects: Grant agencies: VEGA, KEGA<br>Member of PC: CompSysTech, E-learning, ITAT, Znalosti,<br><\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Professional organizations:<br>Member of ACM, Slovak Research Centre for Artficial Intelligence Research, Slovak Society for Computer Science<\/p>\n<\/div>\n\n<div id=\"projects\" class=\"element acf-loop\"><section id=\"projects\" class=\"loop old \" style=\"background-color: #ebf7f9;\" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Projects<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Project loop-style1 loop-load_more loop-4 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22343\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/eset-machine-learning-for-malware-clustering\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_eset-1-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>ESET: Machine learning for malware clustering (industry PhD)\u00a0<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tjan 28. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">With our industry partner, ESET, we created an industrial PhD student position at KInIT to help push the state-of-the-art in the malware domain even further, specifically in malware clustering. Besides&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22302\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB-320x200.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Improving network cybersecurity with hybrid approaches<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tj\u00fal 11. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Network communication is under constant monitoring to detect any unexpected behavior (anomalies). This project focuses on anomaly detection, especially on the harmful anomalies caused by cybercriminals. VNET as a provider&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22236\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/ai4europe-the-unified-platform-for-boosting-european-ai-academic-and-industrial-research\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202207_web_project_AI4EUROPE_WEB-320x200.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>AI4Europe: The unified platform for boosting European AI academic and industrial research<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tj\u00fal 21. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">KInIT joins forces with 23 prominent European institutions to build a better artificial intelligence platform supporting daily needs of academic and industrial AI researchers. In this project, we primarily focus&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22363\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Anomaly detection for improving network cybersecurity<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdec 7. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">People and companies use computers for extended communication, part of which can be highly sensitive and may also be stored in computers or on servers. This may be interesting for&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-loop\"><section class=\"loop old \"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Project loop-style2 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7796\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>FETCH: Future Education and Training in Computing: How to Support Learning at Anytime Anywhere<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Grant No. 539461-LLP-1-2013-1-BG-ERASMUS-ENW. 2013-2015, Chuda, D. &#8211; principal investigator for Slovak University of Technology in Bratislava<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7827\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Misinformation Detection in Healthcare Domain<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">APVV SK-IL-RD-18-0004. 2018-2020, Partner: Bar Ilan University (prof. Sarit Kraus), Bielikova, M. &#8211; principal investigator<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7849\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Automated Recognition of Antisocial Behaviour in Online Communities<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 23. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">APVV-17-0267. 2018-2020, Partners: Comenius University in Bratislava, Technical University in Kosice, Navrat, P. &#8211; principal investigator<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7834\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Human Information Behavior in the Digital Space<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">APVV-15-0508. 2016-2020, Partner: Comenius University in Bratislava, Bielikova, M. &#8211; principal investigator<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7837\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Cognitive Traveling in Digital Space of the Web and Digital Libraries Supported by Personalized Services and Social Networks<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 24. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">APVV-0208-10. 2011-2014, Navrat, P. &#8211; principal investigator<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-7850\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Acquiring, Processing and Visualization of Textual Information Based on Analysis of Similarity Relations<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfeb 22. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">VEGA 1\/0971\/11. 2011-2014, Chuda, D. &#8211; principal investigator<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"featured-publications\" class=\"element acf-loop background-columns-blue\"><section id=\"featured-publications\" class=\"loop old  background-columns-blue\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Publications<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style1 loop-static loop-4 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-loop padding-top-0\"><section class=\"loop old  padding-top-0\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style2 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8060\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1109\/TE.2011.2112768\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>The Issue of (Software) Plagiarism: A Student View<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Chuda, D., Navrat, P., Kovacova, B., Humay, P. &#8211; IEEE Transactions on Education, 2011<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8092\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1093\/iwc\/iwy015\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Biometric Properties of Mouse Interaction Features on the Web<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"authors\">Chuda, D., Kratky, P., Burda, K. &#8211; Interacting with Computers, <span class=\"published-date\">September 2018<\/span><span class=\"published-year\"><\/span><\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8091\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1007\/s10844-018-0500-0\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Recognition of web users with the aid of biometric user model<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"authors\">Kratky, P., Chuda, D. &#8211; Journal of Intelligent Information Systems, <span class=\"published-date\">2018<\/span><span class=\"published-year\"><\/span><\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1007\/s10844-018-0500-0\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8065\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.4018\/ijhcitp.2015010104\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Kratky, P., Chuda, D. &#8211; International Journal of Human Capital and Information Technology Professionals, 2015<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8063\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.4018\/IJHCITP.2016070103\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Big Five Personality in Online Learning and Games: Analysis of Student Activity<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Kratky, P., Tvarozek, J., Chuda, D. &#8211; International Journal of Human Capital and Information Technology Professionals, 2016<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8057\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/doi.org\/10.1016\/j.sbspro.2010.03.478\" target=\"_blank\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Support for Checking Plagiarism in e-Learning<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t                                              \t\t\t\t<div class=\"excerpt\">Chuda, D., Navrat, P. &#8211; Procedia &#8211; Social and Behavioral Sciences, 2010<\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/scholar.google.sk\/citations?user=7AaHqcYAAAAJ&#038;hl=en%20\" target=\"_blank\" class=\"button purple all\">All publications: see google scholar profile<\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"selected-student-supervising\">Selected Student Supervising<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>She supervised more than 100 bachelor, master and PhD theses.<br>Selected student theses:<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h4 class=\"wp-block-heading\" id=\"phd\"><strong>PhD<\/strong><\/h4>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Goldschmidt Patrik &#8211; Machine learning in security. Ongoing<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Mocko Martin &#8211; Machine learning in security. Industrial partner: ESET. Ongoing<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Burda Kamil &#8211; Behavioral biometrics in the context of user authentication on mobile devices. Defended 2022.<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Kr\u00e1tky Peter &#8211; Biometric User Model for Recognition on the Web. Defended 2016<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h4 class=\"wp-block-heading\" id=\"master\"><strong>Master<\/strong><\/h4>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Bernad Marek &#8211; Electronic Identity. Defended 2019<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Gulis Ivan &#8211; Similarity detection of game-playing software. Defended 2018<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Michalko Pavel &#8211; Detecting Text Similarity on the Web. Defended 2013<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Mar\u0161alek Maro\u0161 &#8211; Source code authorship detection using user modelling. Defended 2013<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Krajn\u00edk Peter &#8211; The combined usermodel for user identification. Defended 2012<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Chlpek J\u00e1n &#8211; Similarity of Slovak Texts. Defended 2012<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Kumor Andrej &#8211; Use of morphology for slovak text similarity determination. Defended 2012<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Uhl\u00edk Martin &#8211; Similarity of the programming codes. Defended 2011<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Majer\u010d\u00edk Maro\u0161 &#8211; User model for identification. Defended 2009<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Kov\u00e1\u010dov\u00e1 Bianka &#8211; Similarity and the recognition of the programming code. Defended 2009<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>\u010eurfina Michal &#8211; Multifactor authentication. Defended 2008<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h4 class=\"wp-block-heading\" id=\"bachelor\"><strong>Bachelor<\/strong><\/h4>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>Jan\u00edk Luk\u00e1\u0161 &#8211; User Authentication System on Android Devices. Defended 2019<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Sedl\u00e1\u0159 Jakub &#8211; Simulator of model of formal computing machines for Android. Defended 2018<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Gulis Martin &#8211; Simulator of model of formal computing machines for Android. Defended 2017<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Hagara Luk\u00e1\u0161 &#8211; The influence of biometric characteristics on user experience modeling. Defended 2016<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Trizna Jakub &#8211; Simulator of model of formal computing machines for Android. Defended 2015<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Krajn\u00edk Peter &#8211; The impact of biometric characteristics to model for user identification. Defended 2010<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Chlpek J\u00e1n &#8211; The influence of readability index for determining the similarity in texts. Defended 2010<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Kumor Andrej &#8211; The influence of readability index for determining the similarity in texts. Defended 2010<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>Rodina Du\u0161an &#8211; Simulator of model of formal computing machines, Turing machine and RAM. Defended 2008<\/li>\n<\/div><\/ul>\n<\/div>","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[75,81],"class_list":["post-5570","member","type-member","status-publish","hentry","category-management-board-sk","category-data-analytics-for-green-energy-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Daniela Chud\u00e1 - KInIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Daniela Chud\u00e1 - KInIT\" \/>\n<meta property=\"og:description\" content=\"Daniela focuses on information security, privacy, behavioral biometrics in the context of user authentication, similarity of texts and detection of misinformation. She concentrates on advanced methods of user modeling and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T13:39:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/daniela-chuda\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/daniela-chuda\\\/\",\"name\":\"Daniela Chud\u00e1 - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"datePublished\":\"2021-02-16T17:42:11+00:00\",\"dateModified\":\"2025-10-15T13:39:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/daniela-chuda\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/daniela-chuda\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/daniela-chuda\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/uvod\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Analytics for Green Energy\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/category\\\/data-analytics-for-green-energy-sk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Daniela Chud\u00e1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Daniela Chud\u00e1 - KInIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/","og_locale":"sk_SK","og_type":"article","og_title":"Daniela Chud\u00e1 - KInIT","og_description":"Daniela focuses on information security, privacy, behavioral biometrics in the context of user authentication, similarity of texts and detection of misinformation. She concentrates on advanced methods of user modeling and...","og_url":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/","og_site_name":"KInIT","article_modified_time":"2025-10-15T13:39:19+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"3 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/","url":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/","name":"Daniela Chud\u00e1 - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"datePublished":"2021-02-16T17:42:11+00:00","dateModified":"2025-10-15T13:39:19+00:00","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/uvod\/"},{"@type":"ListItem","position":2,"name":"Data Analytics for Green Energy","item":"https:\/\/kinit.sk\/sk\/category\/data-analytics-for-green-energy-sk\/"},{"@type":"ListItem","position":3,"name":"Daniela Chud\u00e1"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/member"}],"version-history":[{"count":17,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5570\/revisions"}],"predecessor-version":[{"id":38622,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5570\/revisions\/38622"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=5570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=5570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}