FOR CONGRESS C Wilson Focus on Terrorism 9, 1, 2007 | 196 | 2007 |
Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2008 | 158 | 2008 |
Improvised explosive devices (IEDs) in Iraq and Afghanistan: effects and countermeasures C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007 | 124 | 2007 |
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments C Wilson Library of Congress Washington DC Congressional Research Service, 2008 | 119 | 2008 |
Network centric warfare: background and oversight issues for Congress C Wilson Library of Congress Washington DC Congressional Research Service, 2004 | 115 | 2004 |
Terrorist capabilities for cyberattack: Overview and Policy issues J Rollins, C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007 | 93 | 2007 |
Network centric operations: background and oversight issues for congress C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007 | 82 | 2007 |
Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues C Wilson Library of Congress Washington DC Congressional Research Service, 2007 | 48 | 2007 |
Cyber threats to critical information infrastructure C Wilson Cyberterrorism, 123-136, 2014 | 32 | 2014 |
Avatars, virtual reality technology, and the US military: Emerging policy issues C Wilson Library of Congress Washington DC Congressional Research Service, 2008 | 28 | 2008 |
Information Operations and Cyberwar: Capabilities and Related Policy Issues C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006 | 27 | 2006 |
Terrorist capabilities for cyber-attack C Wilson International CIIP Handbook 2, 69-88, 2006 | 25 | 2006 |
Use of relocatable stereotactic frame to integrate positron emission tomography and computed tomography images: application in human malignant brain tumours DGT Thomas, SS Gill, CB Wilson, JL Darling, CS Parkins Stereotactic and Functional Neurosurgery 54 (1-8), 388-392, 1990 | 24 | 1990 |
Cyber crime C Wilson Cyberpower and national security 415, 2009 | 22 | 2009 |
Information Operations C Wilson Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues …, 2007 | 21 | 2007 |
Avatars C Wilson Virtual Reality Technology, and the US Military: Emerging Policy Issues, 4-12, 2008 | 20 | 2008 |
Improvised explosive devices (IEDs) in Iraq: Effects and countermeasures C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006 | 19 | 2006 |
Improvised explosive devices in Iraq: effects and countermeasures C Wilson LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2005 | 16 | 2005 |
Cyberterrorism: Vulnerabilities and policy issues for congress C Wilson, C Botnets Foreign Affairs, Defense, and Trade Division, United States Governemnt, CRS …, 2008 | 13 | 2008 |
Artificial intelligence and warfare C Wilson 21st Century Prometheus, 125-140, 2020 | 11 | 2020 |