Follow
Clay Wilson
Clay Wilson
Professor Cybersecurity
Verified email at faculty.umgc.edu
Title
Cited by
Cited by
Year
Computer attack and cyber terrorism: vulnerabilities and policy issues for congress
C Wilson
Focus on Terrorism 9 (1), 1-42, 2003
1892003
Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson
Congressional Research Service, 2008
1792008
Improvised explosive devices (IEDs) in Iraq and Afghanistan: effects and countermeasures
C Wilson, Foreign Affairs, Defense, and Trade Division
Congressional Research Service, Library of Congress, 2007
1332007
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
C Wilson, Foreign Affairs, Defense, and Trade Division
Congressional Research Service, Library of Congress, 2006
1322006
Network centric warfare: background and oversight issues for Congress
C Wilson, Foreign Affairs, Defense, and Trade Division
Congressional Information Service, Library of Congress, 2004
1192004
Terrorist capabilities for cyberattack: Overview and policy issues
J Rollins, C Wilson
Washington, DC, 2007
1032007
Network centric operations: background and oversight issues for congress
C Wilson
Congressional Research Service, 2007
892007
Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues
C Wilson
Congressional Research Service, 2007
552007
Cyber threats to critical information infrastructure
C Wilson
Cyberterrorism: Understanding, Assessment, and Response, 123-136, 2014
452014
Information Operations and Cyberwar: Capabilities and Related Policy Issues
C Wilson
Congressional Research Service, Library of Congress, 2006
292006
Cyber crime
C Wilson
Cyberpower and national security 415, 2009
282009
Avatars, virtual reality technology, and the US military: Emerging policy issues
C Wilson
Congressional Research Service, 2008
282008
Avatars
C Wilson
Virtual Reality Technology, and the US Military: Emerging Policy Issues, 4-12, 2008
262008
Terrorist capabilities for cyber-attack
C Wilson
International CIIP Handbook 2, 69-88, 2006
262006
Use of relocatable stereotactic frame to integrate positron emission tomography and computed tomography images: application in human malignant brain tumours
DGT Thomas, SS Gill, CB Wilson, JL Darling, CS Parkins
Stereotactic and Functional Neurosurgery 54 (1-8), 388-392, 1990
231990
Information Operations
C Wilson
Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues …, 2007
212007
Cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson, C Botnets
Foreign Affairs, Defense, and Trade Division, United States Governemnt, CRS …, 2008
202008
Improvised explosive devices (IEDs) in Iraq: Effects and countermeasures
C Wilson
Congressional Research Service, the Library of Congress, 2006
182006
Improvised explosive devices in Iraq: effects and countermeasures
C Wilson
Congressional Research Service, the Library of Congress, 2005
162005
Artificial intelligence and warfare
C Wilson
21st Century Prometheus: Managing CBRN Safety and Security Affected by …, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20