Follow
Clay Wilson
Clay Wilson
Professor Cybersecurity
Verified email at faculty.umuc.edu
Title
Cited by
Cited by
Year
FOR CONGRESS
C Wilson
Focus on Terrorism 9, 1, 2007
1962007
Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2008
1582008
Improvised explosive devices (IEDs) in Iraq and Afghanistan: effects and countermeasures
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007
1242007
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
C Wilson
Library of Congress Washington DC Congressional Research Service, 2008
1192008
Network centric warfare: background and oversight issues for Congress
C Wilson
Library of Congress Washington DC Congressional Research Service, 2004
1152004
Terrorist capabilities for cyberattack: Overview and Policy issues
J Rollins, C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007
932007
Network centric operations: background and oversight issues for congress
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007
822007
Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues
C Wilson
Library of Congress Washington DC Congressional Research Service, 2007
482007
Cyber threats to critical information infrastructure
C Wilson
Cyberterrorism, 123-136, 2014
322014
Avatars, virtual reality technology, and the US military: Emerging policy issues
C Wilson
Library of Congress Washington DC Congressional Research Service, 2008
282008
Information Operations and Cyberwar: Capabilities and Related Policy Issues
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006
272006
Terrorist capabilities for cyber-attack
C Wilson
International CIIP Handbook 2, 69-88, 2006
252006
Use of relocatable stereotactic frame to integrate positron emission tomography and computed tomography images: application in human malignant brain tumours
DGT Thomas, SS Gill, CB Wilson, JL Darling, CS Parkins
Stereotactic and Functional Neurosurgery 54 (1-8), 388-392, 1990
241990
Cyber crime
C Wilson
Cyberpower and national security 415, 2009
222009
Information Operations
C Wilson
Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues …, 2007
212007
Avatars
C Wilson
Virtual Reality Technology, and the US Military: Emerging Policy Issues, 4-12, 2008
202008
Improvised explosive devices (IEDs) in Iraq: Effects and countermeasures
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006
192006
Improvised explosive devices in Iraq: effects and countermeasures
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2005
162005
Cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson, C Botnets
Foreign Affairs, Defense, and Trade Division, United States Governemnt, CRS …, 2008
132008
Artificial intelligence and warfare
C Wilson
21st Century Prometheus, 125-140, 2020
112020
The system can't perform the operation now. Try again later.
Articles 1–20