Dr. Clay Wilson, Ph.D.
Program Director for Cybersecurity, Lead for AI policy
Research Expertise
About
Publications
Congressional Research Service
Congress A to Z / Jan 01, 2008
Congressional Research Service. (2008). In Congress A to Z. CQ Press. https://doi.org/10.4135/9781483300498.n92
Deception in Defense of Computer Systems from Cyber Attack
Cyber Warfare and Cyber Terrorism / Jan 01, 2007
Rowe, N. C. (2007). Deception in Defense of Computer Systems from Cyber Attack. In Cyber Warfare and Cyber Terrorism (pp. 97–104). IGI Global. https://doi.org/10.4018/978-1-59140-991-5.ch013
IEDs in “New Wars”
Improvised Explosive Devices / Jan 01, 2016
Revill, J. (2016). IEDs in “New Wars.” In Improvised Explosive Devices (pp. 59–76). Springer International Publishing. https://doi.org/10.1007/978-3-319-33834-7_4
12 A special HEMP-resilient protection and automation devices
Protecting Electrical Equipment / Feb 22, 2021
12 A special HEMP-resilient protection and automation devices. (2021). In Protecting Electrical Equipment (pp. 144–196). De Gruyter. https://doi.org/10.1515/9783110723144-012
Oceans and coastal resources : a briefing book / Oceans and Coastal Management Issues Team, Congressional Research Service.
Jan 01, 1993
(1993). Oceans and coastal resources : a briefing book / Oceans and Coastal Management Issues Team, Congressional Research Service. Congressional Research Service, Library of Congress,. https://doi.org/10.5962/bhl.title.45967
Nuclear Capabilities of North Korea
National Security Issues in Science, Law, and Technology / Apr 16, 2007
Johnson, T. (2007). Nuclear Capabilities of North Korea: Issues in Intelligence Collection, Analysis, and National Security Policy. In National Security Issues in Science, Law, and Technology (pp. 97–119). CRC Press. https://doi.org/10.1201/9781420019087.ch5
Network-Centric Service-Oriented Enterprises
Network-Centric Service-Oriented Enterprise / Jan 01, 2007
Network-Centric Service-Oriented Enterprises. (2007). In Network-Centric Service-Oriented Enterprise (pp. 449–500). Springer Netherlands. https://doi.org/10.1007/978-1-4020-6456-2_10
Cyberwar and its Borders
Cyberwar and Information Warfare / Aug 08, 2011
Cyberwar and its Borders. (2011, August 8). Cyberwar and Information Warfare; Wiley; Portico. https://doi.org/10.1002/9781118603482.ch1
Cyber Threats to Critical Information Infrastructure
Cyberterrorism / Jan 01, 2014
Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. In Cyberterrorism (pp. 123–136). Springer New York. https://doi.org/10.1007/978-1-4939-0962-9_7
Cyber Crime
Cyberpower and National Security / Mar 01, 2011
Wilson, C. (2011). Cyber Crime. In Cyberpower and National Security (pp. 415–436). University of Nebraska Press. https://doi.org/10.2307/j.ctt1djmhj1.23
Cognitive and synthetic behavior of avatars in intelligent virtual environments
Virtual Reality / Mar 01, 2008
Liang, R., Zhang, M., Liu, Z., & Krokos, M. (2008). Cognitive and synthetic behavior of avatars in intelligent virtual environments. Virtual Reality, 12(1), 47–54. https://doi.org/10.1007/s10055-008-0089-7
AVACHAT
Proceedings of the 2008 ACM symposium on Virtual reality software and technology / Oct 27, 2008
Park, S.-H., Ji, S.-H., Ryu, D.-S., & Cho, H.-G. (2008, October 27). AVACHAT: a new comic-based chat system for virtual avatars. Proceedings of the 2008 ACM Symposium on Virtual Reality Software and Technology. https://doi.org/10.1145/1450579.1450652
The Economic Impact of a Terrorist Attack
Securing Utility and Energy Infrastructures / Apr 10, 2006
The Economic Impact of a Terrorist Attack. (2006, April 10). Securing Utility and Energy Infrastructures; Wiley; Portico. https://doi.org/10.1002/0470054549.ch2
Improvised Explosive Devices in Iraq, 2003-09: A Case of Operational Surprise and Institutional Response
Apr 01, 2011
Smith, A. (2011). Improvised Explosive Devices in Iraq, 2003-09: A Case of Operational Surprise and Institutional Response. Defense Technical Information Center. https://doi.org/10.21236/ada542983
Report by the United States
Trade Policy Reviews / Aug 01, 2008
(2008). Report by the United States. In Trade Policy Review: United States of America 2008 (pp. 196–230). WTO. https://doi.org/10.30875/fed26ed2-en
Artificial Intelligence and Warfare
21st Century Prometheus / Jan 01, 2020
Wilson, C. (2020). Artificial Intelligence and Warfare. In 21st Century Prometheus (pp. 125–140). Springer International Publishing. https://doi.org/10.1007/978-3-030-28285-1_7
Testing, Defining and Delivering Nuclear Weapons
The Politics of Nuclear Weapons / Jan 01, 2015
Testing, Defining and Delivering Nuclear Weapons. (2015). In The Politics of Nuclear Weapons (pp. 30–48). SAGE Publications Ltd. https://doi.org/10.4135/9781473917170.n3
News
Pharmaceutical Patent Analyst / May 01, 2013
News. (2013). Pharmaceutical Patent Analyst, 2(3), 299–301. https://doi.org/10.4155/ppa.13.28
Terrorism and Cybercrime
May 01, 2008
Chargualaf, J., & Joseph. (2008). Terrorism and Cybercrime. Defense Technical Information Center. https://doi.org/10.21236/ada488040
Strategic Governance of IEDs
Improvised Explosive Devices / Jan 01, 2016
Revill, J. (2016). Strategic Governance of IEDs. In Improvised Explosive Devices (pp. 91–109). Springer International Publishing. https://doi.org/10.1007/978-3-319-33834-7_6
Cybersecurity and Cyber Weapons: Is Nonproliferation Possible?
Cyber Security / Jan 01, 2013
Wilson, C. (2013). Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? In SpringerBriefs in Computer Science (pp. 11–24). Springer International Publishing. https://doi.org/10.1007/978-3-319-02279-6_2
Conclusion
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Conclusion. In SpringerBriefs in Computer Science (pp. 71–73). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_16
Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0. In SpringerBriefs in Computer Science (pp. 63–69). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_15
The Legal Regulations of E-Government
2011 International Conference on Management and Service Science / Aug 01, 2011
He, Z. (2011, August). The Legal Regulations of E-Government. 2011 International Conference on Management and Service Science. https://doi.org/10.1109/icmss.2011.5999430
Cyber Conflict
Current and Emerging Trends in Cyber Operations
Applegate, S. (n.d.). Cyber Conflict. In Current and Emerging Trends in Cyber Operations. Palgrave Macmillan. https://doi.org/10.1057/9781137455550.0006
Vulnerabilities and Security Issues
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Vulnerabilities and Security Issues. In SpringerBriefs in Computer Science (pp. 11–15). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_4
US-China Relations
Advances in Digital Crime, Forensics, and Cyber Terrorism / Jan 01, 2016
Wilson, C., & Drumhiller, N. (2016). US-China Relations: Cyber Espionage and Cultural Bias. In National Security and Counterintelligence in the Era of Cyber Espionage (pp. 28–46). IGI Global. https://doi.org/10.4018/978-1-4666-9661-7.ch002
Bibliographisches Institut AG (Mannheim) v. VEB Bibliographisches Institut (Leipzig)
International Law Reports / Jan 01, 1987
Bibliographisches Institut AG (Mannheim) v. VEB Bibliographisches Institut (Leipzig). (1987). International Law Reports, 72, 26–28. https://doi.org/10.1017/cbo9781316152003.008
Nova Publishers
Focus on Catalysts / Jan 01, 2007
Nova Publishers. (2007). Focus on Catalysts, 2007(1), 8. https://doi.org/10.1016/s1351-4180(06)72048-7
Future Attack Patterns
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Future Attack Patterns. In SpringerBriefs in Computer Science (pp. 59–62). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_14
Patent Selections
Recent Patents on Computer Science / Jan 16, 2009
Publishers. (2009). Patent Selections. Recent Patents on Computer Science, 2(1), 86–90. https://doi.org/10.2174/1874479600902010086
U.S. Army's Modular Redesign: Issues for Congress. CRS Report for Congress
PsycEXTRA Dataset / Jan 01, 2005
Feickert, A. (2005). U.S. Army’s Modular Redesign: Issues for Congress. CRS Report for Congress: (456652006-001) [dataset]. In PsycEXTRA Dataset. American Psychological Association (APA). https://doi.org/10.1037/e456652006-001
Measurement of Unit Activity in Various Systems of the Brain Postoperatively A Preliminary Study
Stereotactic and Functional Neurosurgery / Jan 01, 1970
Marg, E., Chow, R., Perkins, R. K., Olsen, E. R., & Wilson, C. B. (1970). Measurement of Unit Activity in Various Systems of the Brain Postoperatively A Preliminary Study. Stereotactic and Functional Neurosurgery, 32(1), 53–62. Portico. https://doi.org/10.1159/000103394
Introduction
Wide-Band-Gap Semiconductors / Jan 01, 1993
Van de Walle, C. G. (1993). Introduction. In Wide-Band-Gap Semiconductors (pp. ix–x). Elsevier. https://doi.org/10.1016/b978-0-444-81573-6.50004-9
UOP to develop biofuel technology for military jets
Focus on Catalysts / Aug 01, 2007
UOP to develop biofuel technology for military jets. (2007). Focus on Catalysts, 2007(8), 2. https://doi.org/10.1016/s1351-4180(07)70420-8
Investigations Into the Application of NMS Tools to Modeling the Global Information Grid (GIG)
Apr 30, 2005
Doshi, B., & Cole, R. G. (2005). Investigations Into the Application of NMS Tools to Modeling the Global Information Grid (GIG). Defense Technical Information Center. https://doi.org/10.21236/ada441364
Governance and Management Frameworks
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Governance and Management Frameworks. In SpringerBriefs in Computer Science (pp. 21–23). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_7
Factors Important in Developing Regional Steel Corrosion Models
i-manager's Journal on Structural Engineering / Aug 15, 2012
O’dea, M., C. Graham, F., & H. Mccuen, R. (2012). Factors Important in Developing Regional Steel Corrosion Models. I-Manager’s Journal on Structural Engineering, 1(2), 1–10. https://doi.org/10.26634/jste.1.2.1926
The preparation and storage of anaesthetic drugs for obstetric emergencies: a survey of UK practice
International Journal of Obstetric Anesthesia / Jul 01, 2009
Stone, J. P., Fenner, L. B., & Christmas, T. R. (2009). The preparation and storage of anaesthetic drugs for obstetric emergencies: a survey of UK practice. International Journal of Obstetric Anesthesia, 18(3), 242–248. https://doi.org/10.1016/j.ijoa.2009.01.013
Modeling Threats and Risks
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Modeling Threats and Risks. In SpringerBriefs in Computer Science (pp. 17–18). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_5
Known Weaknesses with Security Controls
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Known Weaknesses with Security Controls. In SpringerBriefs in Computer Science (pp. 27–28). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_9
Examples in Brief
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Examples in Brief. In SpringerBriefs in Computer Science (pp. 33–35). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_12
Modeling Vulnerabilities
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Modeling Vulnerabilities. In SpringerBriefs in Computer Science (pp. 19–20). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_6
What Is Highly Critical Wireless Networking (HCWN)
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). What Is Highly Critical Wireless Networking (HCWN). In SpringerBriefs in Computer Science (pp. 3–5). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_2
Applications for HCWN
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Applications for HCWN. In SpringerBriefs in Computer Science (pp. 7–10). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_3
Security Technologies for Networked Devices
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Security Technologies for Networked Devices. In SpringerBriefs in Computer Science (pp. 25–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_8
Assessing the Effectiveness and Efficiency of Security Approaches
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Assessing the Effectiveness and Efficiency of Security Approaches. In SpringerBriefs in Computer Science (pp. 31–32). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_11
Competent Reliable Operation of HCWN
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Competent Reliable Operation of HCWN. In SpringerBriefs in Computer Science (pp. 29–30). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_10
Testing the Resilience of HCWN
Information Security of Highly Critical Wireless Networks / Jan 01, 2017
Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Testing the Resilience of HCWN. In SpringerBriefs in Computer Science (pp. 37–58). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_13
General principles and safe paediatric anaesthesia
Core Topics in Paediatric Anaesthesia / Jul 04, 2013
James, I. (2013). General principles and safe paediatric anaesthesia. In Core Topics in Paediatric Anaesthesia (pp. 96–105). Cambridge University Press. https://doi.org/10.1017/cbo9780511978906.012
Aspects of non-classical organolanthanide chemistry
Journal of Organometallic Chemistry / Mar 01, 2002
Cristina Cassani, M., Gun’ko, Y. K., Hitchcock, P. B., Hulkes, A. G., Khvostov, A. V., Lappert, M. F., & Protchenko, A. V. (2002). Aspects of non-classical organolanthanide chemistry. Journal of Organometallic Chemistry, 647(1–2), 71–83. https://doi.org/10.1016/s0022-328x(01)01484-x
News
Neuroscience Research / Sep 01, 1994
News. (1994). Neuroscience Research, 20(3), 287–288. https://doi.org/10.1016/0168-0102(94)90099-x
TET Summer 1992: Environmental Measurements
Nov 01, 1993
Gunn, J. T., Dewey, R. K., Rubenstein, D., & Wilson, C. (1993). TET Summer 1992: Environmental Measurements. Defense Technical Information Center. https://doi.org/10.21236/ada273060
Strategy for OCRWM to provide training assistance to state, tribal, and local governments
Nov 01, 1992
none. (1992). Strategy for OCRWM to provide training assistance to state, tribal, and local governments. Office of Scientific and Technical Information (OSTI). https://doi.org/10.2172/7025582
12 Positron-emission tomography (PET)Molecular imagingpositron-emission tomography (PET)Molecular Imaging: PET and SPECT
Brain Tumor Imaging / Jan 01, 2016
Jain, R., & Essig, M. (Eds.). (2016). 12 Positron-emission tomography (PET)Molecular imagingpositron-emission tomography (PET)Molecular Imaging: PET and SPECT. In Brain Tumor Imaging. Georg Thieme Verlag. https://doi.org/10.1055/b-0035-122303
Documents
Terrorism / Jan 01, 1979
Documents. (1979). Terrorism, 2(1–2), 139–147. https://doi.org/10.1080/10576107908435429
Education
George Mason University
Cyber Security / May, 2001
Experience
University of Maryland, Global Campus
Cybersecurity Researcher / March, 2004 — May, 2009
Researcher for cyber vulnerabilities for military systems, EMP, nanotechnology, Artificial intelligence
Program Director for Cybersecurity / August, 2023 — January, 2023
Lead for adapting CSTEM department to include Artificial Intelligence into classrooms.
Join Clay on NotedSource!
Join Now
At NotedSource, we believe that professors, post-docs, scientists and other researchers have deep, untapped knowledge and expertise that can be leveraged to drive innovation within companies. NotedSource is committed to bridging the gap between academia and industry by providing a platform for collaboration with industry and networking with other researchers.
For industry, NotedSource identifies the right academic experts in 24 hours to help organizations build and grow. With a platform of thousands of knowledgeable PhDs, scientists, and industry experts, NotedSource makes connecting and collaborating easy.
For academic researchers such as professors, post-docs, and Ph.D.s, NotedSource provides tools to discover and connect to your colleagues with messaging and news feeds, in addition to the opportunity to be paid for your collaboration with vetted partners.