Clay Wilson
Clay Wilson
Professor Cybersecurity
Verified email at faculty.umuc.edu
TitleCited byYear
Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson
Focus on Terrorism 9 (1), 1-42, 2003
1682003
Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2008
1272008
Multi-Tiered Cache with Storage Medium Awareness
S Sengupta, J Li, C Huang, TA Pritchett, CB Wilson
US Patent App. 13/531,455, 2013
1092013
Improvised explosive devices (IEDs) in Iraq and Afghanistan: effects and countermeasures
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007
1092007
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2008
932008
Network centric warfare: background and oversight issues for Congress
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2004
932004
Immunological characterization of a basement membrane-specific chondroitin sulfate proteoglycan.
KJ McCarthy, MA Accavitti, JR Couchman
The Journal of cell biology 109 (6), 3187-3198, 1989
921989
Terrorist capabilities for cyberattack: Overview and Policy issues
J Rollins, C Wilson
LindenE. V.(Ed.), Focus on Terrorism 9, 43-63, 2007
862007
Network centric operations: background and oversight issues for congress
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2007
722007
Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues
C Wilson
Library of Congress Washington DC Congressional Research Service, 2007
452007
Terrorist capabilities for cyber-attack
C Wilson
International CIIP handbook 2, 69-88, 2006
242006
Use of relocatable stereotactic frame to integrate positron emission tomography and computed tomography images: application in human malignant brain tumours
DGT Thomas, SS Gill, CB Wilson, JL Darling, CS Parkins
Stereotactic and functional neurosurgery 54 (1-8), 388-392, 1990
241990
Cyber threats to critical information infrastructure
C Wilson
Cyberterrorism, 123-136, 2014
222014
Consistent Hashing Table for Workload Distribution
J Li, C Huang, S Sengupta, CB Wilson
US Patent App. 13/438,465, 2013
222013
Understanding the dynamics of socio-economic mobility: Tales from two Indian villages
C Wilson
Overseas Development Institute, 2004
222004
Information operations and cyberwar: Capabilities and related policy issues
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006
202006
Avatars, virtual reality technology, and the US military: Emerging policy issues
C Wilson
Library of Congress Washington DC Congressional Research Service, 2008
192008
Information Operations
C Wilson
Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues …, 2007
192007
Cyber crime
C Wilson
Cyberpower and national security, 415-436, 2009
182009
Improvised explosive devices (IEDs) in Iraq: Effects and countermeasures
C Wilson
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2006
182006
The system can't perform the operation now. Try again later.
Articles 1–20