default search action
Daniela Chudá
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Daniela Chudá, Lukas Janik:
Enhancing Smartphone Security through Behavioral Biometrics-based Gestures. ITAT 2024: 226-228 - [i2]Andrea Hrckova, Jennifer Renoux, Rafael Tolosana-Calasanz, Daniela Chudá, Martin Tamajka, Jakub Simko:
AI Research is not Magic, it has to be Reproducible and Responsible: Challenges in the AI field from the Perspective of its PhD Students. CoRR abs/2408.06847 (2024) - 2023
- [i1]Dominik Macko, Patrik Goldschmidt, Peter Pistek, Daniela Chudá:
Assessing the Impact of a Supervised Classification Filter on Flow-based Hybrid Network Anomaly Detection. CoRR abs/2310.06656 (2023) - 2021
- [c24]Juraj Petrík, Daniela Chudá:
The effect of time drift in source code authorship attribution: Time drifting in source code - stylochronometry. CompSysTech 2021: 87-92 - 2020
- [c23]Lukas Janik, Daniela Chudá, Kamil Burda:
SGFA: A Two-Factor Smartphone Authentication Mechanism Using Touch Behavioral Biometrics. CompSysTech 2020: 35-42
2010 – 2019
- 2019
- [c22]Juraj Petrík, Daniela Chudá:
Bots and Gender Profiling with Convolutional Hierarchical Recurrent Neural Network. CLEF (Working Notes) 2019 - [c21]Juraj Petrík, Daniela Chudá:
Twitter Feeds Profiling with TF-IDF. CLEF (Working Notes) 2019 - [c20]Martin Labaj, Karol Rástocný, Daniela Chudá:
Towards Automatic Comparison of Cloud Service Security Certifications. SOFSEM 2019: 298-309 - 2018
- [j5]Daniela Chudá, Peter Krátky, Kamil Burda:
Biometric Properties of Mouse Interaction Features on the Web. Interact. Comput. 30(5): 359-377 (2018) - [j4]Peter Krátky, Daniela Chudá:
Recognition of web users with the aid of biometric user model. J. Intell. Inf. Syst. 51(3): 621-646 (2018) - [c19]Juraj Petrík, Daniela Chudá:
Source code authorship approaches natural language processing. CompSysTech 2018: 58-61 - [c18]Kamil Burda, Daniela Chudá:
Influence of Body Postures on Touch-Based Biometric User Authentication. SOFSEM 2018: 459-468 - 2017
- [c17]Peter Krátky, Tomás Repiský, Daniela Chudá:
Is the Visitor Reading or Navigating? CompSysTech 2017: 80-87 - 2016
- [j3]Peter Krátky, Jozef Tvarozek, Daniela Chudá:
Big Five Personality in Online Learning and Games: Analysis of Student Activity. Int. J. Hum. Cap. Inf. Technol. Prof. 7(3): 33-46 (2016) - [c16]Daniela Chudá, Kamil Burda:
Toward Posture Recognition with Touch Screen Biometrics. CompSysTech 2016: 293-299 - [c15]Peter Krátky, Daniela Chudá:
Fine-tuning Web Traffic Statistics by Deduplication and Splitting of Visitors Records Using Mouse Biometrics. CompSysTech 2016: 300-306 - [c14]Peter Krátky, Daniela Chudá:
Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse. WWW (Companion Volume) 2016: 61-62 - 2015
- [j2]Daniela Chudá, Peter Krátky:
Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling. Int. J. Hum. Cap. Inf. Technol. Prof. 6(1): 39-50 (2015) - [c13]Daniela Chudá, Peter Krátky:
Grouping instances in kNN for classification based on computer mouse features. CompSysTech 2015: 214-220 - [c12]Daniela Chudá, Peter Krátky, Jozef Tvarozek:
Mouse Clicks Can Recognize Web Page Visitors! WWW (Companion Volume) 2015: 21-22 - 2014
- [c11]Tomás Kucecka, Daniela Chudá:
Similarity detection among longer texts by matching keywords found in segments. CompSysTech 2014: 142-149 - [c10]Daniela Chudá, Peter Krátky:
Usage of computer mouse characteristics for identification in web browsing. CompSysTech 2014: 218-225 - 2012
- [j1]Daniela Chudá, Pavol Návrat, Bianka Kovácová, Pavel Humay:
The Issue of (Software) Plagiarism: A Student View. IEEE Trans. Educ. 55(1): 22-28 (2012) - 2011
- [c9]Daniela Chudá, Ján Chlpek, Andrej Kumor:
The impact of text pre-processing to determine the similarity in students assignments. CompSysTech 2011: 417-422 - [c8]Daniela Chudá, Martin Uhlík:
The plagiarism detection by compression method. CompSysTech 2011: 429-434 - 2010
- [c7]Daniela Chudá, Dusan Rodina:
Automata simulator. CompSysTech 2010: 394-399 - [c6]Daniela Chudá, Bianka Kovácová:
Checking plagiarism in e-learning. CompSysTech 2010: 419-424
2000 – 2009
- 2009
- [c5]Daniela Chudá, Martin Nehéz, Michal Cernanský:
On using of random access machine simulators in teaching of theoretical computer science. CompSysTech 2009: 84 - [c4]Daniela Chudá, Michal Durfina:
Multifactor authentication based on keystroke dynamics. CompSysTech 2009: 89 - [c3]Pavol Návrat, Mária Bieliková, Daniela Chudá, Viera Rozinajová:
Intelligent Information Processing in Semantically Enriched Web. ISMIS 2009: 331-340 - 2008
- [c2]Pavol Návrat, Tomas Taraba, Anna Bou Ezzeddine, Daniela Chudá:
Context Search Enhanced by Readability Index. IFIP AI 2008: 373-382 - 2007
- [c1]Daniela Chudá:
Visualization in education of theoretical computer science. CompSysTech 2007: 84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint