Dr. Misty Blowers
at Datalytica LLC
SPIE Involvement:
Conference Chair | Editor | Author | Instructor
Publications (14)

Proceedings Article | 7 June 2024 Presentation
Misty Blowers, Santos Salinas, Seth Bailey
Proceedings Volume 13058, 1305816 (2024) https://doi.org/10.1117/12.3029669
KEYWORDS: Artificial intelligence, Evolutionary algorithms, Reverse engineering, Reverse modeling, Algorithm development, Systems modeling, Software development, Computer security

Proceedings Article | 6 June 2024 Presentation + Paper
Misty Blowers, Santos Salinas, Seth Bailey
Proceedings Volume 13058, 130580H (2024) https://doi.org/10.1117/12.3014424
KEYWORDS: Artificial intelligence, Defense and security, Data modeling, Education and training, Systems modeling, Standards development, Industry, Computer security, Reliability, Industrial applications

Proceedings Article | 15 June 2023 Presentation + Paper
Misty Blowers, Nelson Jaimes, Jon Williams
Proceedings Volume 12542, 125420N (2023) https://doi.org/10.1117/12.2663772
KEYWORDS: Virtual reality, Computer security, Information security, Augmented reality, Education and training, Standards development, Artificial intelligence, Defense and security, Network security, Internet of things

Proceedings Article | 12 April 2021 Presentation
Proceedings Volume 11751, 1175102 (2021) https://doi.org/10.1117/12.2597586

Proceedings Article | 23 September 2020 Open Access Presentation
Proceedings Volume 11540, 1154004 (2020) https://doi.org/10.1117/12.2582836

Showing 5 of 14 publications
Proceedings Volume Editor (17)

SPIE Conference Volume | 13 June 2024

SPIE Conference Volume | 1 August 2023

SPIE Conference Volume | 30 May 2022

SPIE Conference Volume | 30 April 2021

SPIE Conference Volume | 28 May 2020

Showing 5 of 17 publications
Conference Committee Involvement (20)
Disruptive Technologies in Information Sciences IX
14 April 2025 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences VIII
22 April 2024 | National Harbor, Maryland, United States
Disruptive Technologies in Information Sciences VII
1 May 2023 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences VI
4 April 2022 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences V
12 April 2021 | Online Only, Florida, United States
Showing 5 of 20 Conference Committees
Course Instructor
SC1266: Blockchain Technologies and Distributed Ledger Systems
This course will explore such concepts as; hyper-ledger and distributed ledger architectures, cryptography/hashing/encryption algorithms, game theory, crowd sourcing, consensus algorithms, closed and open architectures, advanced hardware architectures (such as the graphics processing units of the of the cryptocurrency mining equipment), smart-contracts, and centralized vs distributed autonomous authority. In addition to the traditional blockchain architectures, this course will cover the explosive interest in smart contract constructs that have been enabled by such things as the Ethereum Network and have been key enablers of Distributed Autonomous Organizations. Discussions will focus on some novel applications of these concepts as well as the Initial Coin Offerings (ICO’s) which are empowering a new wave of entrepreneurs seeking venture capitalist funding. Students in the class will gain some hands-on experience with a smart contract through a framework known as The Distributed Autonomous Classroom, developed by DAX LLC. This tool offers an innovative classroom and training framework that is designed to educate a training community on the potential of blockchain technologies and distributed ledger systems through an experiential learning environment. In this framework, we will use the blockchain to teach the blockchain. Finally, the class will discuss the convergence of Artificial Intelligence with Blockchain and lead some discussions about the next generation of disruptive technologies in IoT and beyond. To conclude, we will discuss when it is appropriate and beneficial to use blockchain technologies vs the more traditional P2P security and communications protocols that have successfully secured numerous communication systems and distributed architectures.
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Advertisement
Advertisement
Back to Top