{"id":5606,"date":"2021-02-14T17:45:23","date_gmt":"2021-02-14T16:45:23","guid":{"rendered":"https:\/\/kinit.sk\/member\/martin-mocko\/"},"modified":"2026-01-12T17:03:06","modified_gmt":"2026-01-12T16:03:06","slug":"martin-mocko","status":"publish","type":"member","link":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/","title":{"rendered":"Martin Mocko"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph\">\n<p>Martin is a research assistant focusing on information security, in particular malware analysis and detection, phishing and malicious behavior. He is also interested in data analysis, machine learning and deep learning. His research currently focuses on clustering of executable files and creating useful representations for machine learning models. <\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He holds a Master\u2019s degree in Intelligent Systems from the Slovak University of Technology. During his studies, he received the Institute of Informatics at the Slovak Academy of Sciences award for excellent study performance. He is currently a PhD student at KInIT, doing his PhD at the Faculty Of Information Technology, Brno University of Technology.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>He has co-operated in research projects with \u010cSOB bank and CEAi. His Master\u2019s thesis focused on anomaly detection in the bank domain. He is a former member of PeWe (Personalized Web) research group. Currently he&#8217;s cooperating with an industry partner, ESET, to bring academic research closer to industry&#8217;s needs. In his free time he enjoys going to the gym, sauna, and various events that facilitate self-improvement in multiple aspects of life.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h3 class=\"wp-block-heading\" id=\"phd-topic\">PhD topic: Malware clustering Using Machine Learning<\/h3>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><strong>Supervising team:<\/strong> <a href=\"https:\/\/kinit.sk\/member\/daniela-chuda\/\">Daniela Chud\u00e1<\/a> (KInIT), <a href=\"https:\/\/kinit.sk\/project\/eset-machine-learning-for-malware-clustering\/\">Eset<\/a> (industry partner)<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Every day, hundreds of thousands of malicious software samples are created with the goal of either harming the victim\u2019s computer, stealing their data, or causing financial damages. To be able to combat the ever-evolving landscape of malware, we need to utilize machine learning solutions to achieve the desired speed, accuracy and scalability of protection. One particular problem in this domain where millions of binary files reside is clustering of existing and newly arriving samples while maintaining an acceptable level of speed and accuracy.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>In our proposal, we formulate the reasons for the large heterogeneity of malware samples, analyze the state of the art in malware clustering, and identify shortcomings of the state of the art research works. Very small and custom collected datasets, labeling problems, lack of consensus on how clustering solutions should be set up, different evaluation metrics and evaluation methodologies that lack addressing cluster size bias (random chance of achieving a good clustering) are all factors that contribute to wildly different conclusions. Furthermore, in the past few years, deep clustering and contrastive learning has been gaining a lot of attention in the research community, while the research works in the malware field have yet to catch up. We address some of the identified issues in our research questions and present the plan of our experiments which will provide answers to these questions.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-embed wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Martin Mocko - Security: Catch more Malware with Deep Clustering\" width=\"500\" height=\"281\" data-src=\"https:\/\/www.youtube.com\/embed\/7zh1NVNdBmQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><\/figure>\n<\/div>\n\n<div id=\"projects\" class=\"element acf-loop\"><section id=\"projects\" class=\"loop old \" style=\"background-color: #ebf7f9;\" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Projects<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Project loop-style1 loop-load_more loop-0 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22343\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/eset-machine-learning-for-malware-clustering\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_eset-1-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>ESET: Machine learning for malware clustering (industry PhD)\u00a0<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tjan 28. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">With our industry partner, ESET, we created an industrial PhD student position at KInIT to help push the state-of-the-art in the malware domain even further, specifically in malware clustering. Besides&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n\n\n<div id=\"featured-publications\" class=\"element acf-loop background-columns-blue\"><section id=\"featured-publications\" class=\"loop old  background-columns-blue\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Selected Publications<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style1 loop-static loop-4 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-38146\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/clustering-malware-at-scale-a-first-full-benchmark-study\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Clustering Malware at\u00a0Scale: A First Full-Benchmark Study<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t  <!--<div class=\"authors\"><strong>Autori:<\/strong> Mocko, M., \u0160evcech, J., Chud\u00e1, D.<\/div>-->\n                          <div class=\"authors\">Mocko, M., \u0160evcech, J., Chud\u00e1, D. &#8211;  Availability, Reliability and Security. ARES 2025, <span class=\"published-date\">2025<\/span><span class=\"published-year\"><\/span><\/div>                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Mocko, M., \u0160evcech, J., Chud\u00e1, D. Recent years have shown that malware attacks still happen with high frequency. Malware experts seek to categorize and classify incoming samples to confirm their&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-032-00627-1_12\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8037\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/improving-recommendation-using-conditioning-of-neural-network-model-slovak\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Improving Recommendation Using Conditioning of Neural Network Model [Slovak]<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t  <!---->\n                                                  \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Mocko, M., Sevcech, J., Bielikova, M. &#8211; Data a znalosti a WIKT 2019, 2019<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hi.kkui.fei.tuke.sk\/daz2019\/DaZ_WIKT_2019_Zbornik.pdf\" class=\"download-file\">Stiahnu\u0165<\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8026\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/simulation-of-bank-transaction-data\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Simulation of Bank Transaction Data<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t  <!---->\n                                                  \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Mocko, M., Sevcech, J. &#8211; 19th International Workshop on Multi-Agent-Based Simulation, 2018<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-8034\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/publikacia\/anomaly-detection-in-transaction-data-using-autoencoders-slovak\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>Anomaly Detection in Transaction Data Using Autoencoders [Slovak]<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t  <!---->\n                                                  \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Mocko, M., Sevcech, J. &#8211; Proceedings of the 12nd Workshop on Intelligent and Knowledge-Oriented Technologies \u2013 WIKT 2017, 2017<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-loop padding-top-0\"><section class=\"loop old  padding-top-0\"  >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Publication loop-style2 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/scholar.google.com\/citations?user=U2Qw_GsAAAAJ&#038;hl=en\" target=\"_blank\" class=\"button purple all\">All publications: see google scholar profile<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h2 class=\"wp-block-heading\" id=\"selected-student-supervising\">Selected Student Supervising<\/h2>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><strong>Master<\/strong>:<br>G\u00e1frik Andrej &#8211; Detection of malicious activities using machine learning methods. Defended<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><strong>Bachelor<\/strong>:<br>Kab\u00e1\u010d Maro\u0161 &#8211; Time series forecasting using neural networks. Defended 2020<\/p>\n<\/div>","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[81],"class_list":["post-5606","member","type-member","status-publish","hentry","category-data-analytics-for-green-energy-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Martin Mocko - KInIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Martin Mocko - KInIT\" \/>\n<meta property=\"og:description\" content=\"Martin is a research assistant focusing on information security, in particular malware analysis and detection, phishing and malicious behavior. He is also interested in data analysis, machine learning and deep...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T16:03:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/martin-mocko\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/martin-mocko\\\/\",\"name\":\"Martin Mocko - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"datePublished\":\"2021-02-14T16:45:23+00:00\",\"dateModified\":\"2026-01-12T16:03:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/martin-mocko\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/martin-mocko\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/clen\\\/martin-mocko\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/uvod\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Analytics for Green Energy\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/category\\\/data-analytics-for-green-energy-sk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Martin Mocko\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Martin Mocko - KInIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/","og_locale":"sk_SK","og_type":"article","og_title":"Martin Mocko - KInIT","og_description":"Martin is a research assistant focusing on information security, in particular malware analysis and detection, phishing and malicious behavior. He is also interested in data analysis, machine learning and deep...","og_url":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/","og_site_name":"KInIT","article_modified_time":"2026-01-12T16:03:06+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/03\/KINIT_Sharepic.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"2 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/","url":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/","name":"Martin Mocko - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"datePublished":"2021-02-14T16:45:23+00:00","dateModified":"2026-01-12T16:03:06+00:00","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/clen\/martin-mocko\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/uvod\/"},{"@type":"ListItem","position":2,"name":"Data Analytics for Green Energy","item":"https:\/\/kinit.sk\/sk\/category\/data-analytics-for-green-energy-sk\/"},{"@type":"ListItem","position":3,"name":"Martin Mocko"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/member"}],"version-history":[{"count":26,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5606\/revisions"}],"predecessor-version":[{"id":39996,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/member\/5606\/revisions\/39996"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=5606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=5606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}