Dr. Clay Wilson, Ph.D.

Program Director for Cybersecurity, Lead for AI policy

Research Expertise

Artificial Intelligence
AI
EMP
cybersecurity
cyber terrorism
Human-Computer Interaction
Computer Graphics and Computer-Aided Design
Software
Neurology (clinical)
Surgery
Anesthesiology and Pain Medicine
Obstetrics and Gynecology
Inorganic Chemistry
Materials Chemistry
Organic Chemistry
Physical and Theoretical Chemistry
Biochemistry
Pharmaceutical Science

About

**Highly innovative, accomplished and visionary Leader with extensive experience in the advanced technical Cyber Security & Artificial Intelligence space focused on building robust governance, infrastructure, policies and procedures.  Expertise in developing and championing graduate level programs within the academic community. Demonstrated effectiveness in cultivating relationships with diverse levels of professionals within private, public, academic and government sectors.**

Legacy Map

Full View

Publications

Congressional Research Service
Congress A to Z
2008
Deception in Defense of Computer Systems from Cyber Attack
Cyber Warfare and Cyber Terrorism
2007
IEDs in “New Wars”
Improvised Explosive Devices
2016
12 A special HEMP-resilient protection and automation devices
Protecting Electrical Equipment
2021
Oceans and coastal resources : a briefing book / Oceans and Coastal Management Issues Team, Congressional Research Service.
Unknown Venue
1993
Nuclear Capabilities of North Korea
National Security Issues in Science, Law, and Technology
2007
Network-Centric Service-Oriented Enterprises
Network-Centric Service-Oriented Enterprise
2007
Cyberwar and its Borders
Cyberwar and Information Warfare
2011
Cyber Threats to Critical Information Infrastructure
Cyberterrorism
2014
Cyber Crime
Cyberpower and National Security
2011
Cognitive and synthetic behavior of avatars in intelligent virtual environments
Virtual Reality
2008
AVACHAT
Proceedings of the 2008 ACM symposium on Virtual reality software and technology
2008
The Economic Impact of a Terrorist Attack
Securing Utility and Energy Infrastructures
2006
Improvised Explosive Devices in Iraq, 2003-09: A Case of Operational Surprise and Institutional Response
Unknown Venue
2011
Report by the United States
Trade Policy Reviews
2008
Artificial Intelligence and Warfare
21st Century Prometheus
2020
Testing, Defining and Delivering Nuclear Weapons
The Politics of Nuclear Weapons
2015
News
Pharmaceutical Patent Analyst
2013
Terrorism and Cybercrime
Unknown Venue
2008
Strategic Governance of IEDs
Improvised Explosive Devices
2016
Cybersecurity and Cyber Weapons: Is Nonproliferation Possible?
Cyber Security
2013
Conclusion
Information Security of Highly Critical Wireless Networks
2017
Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0
Information Security of Highly Critical Wireless Networks
2017
The Legal Regulations of E-Government
2011 International Conference on Management and Service Science
2011
Cyber Conflict
Current and Emerging Trends in Cyber Operations
Vulnerabilities and Security Issues
Information Security of Highly Critical Wireless Networks
2017
US-China Relations
Advances in Digital Crime, Forensics, and Cyber Terrorism
2016
Bibliographisches Institut AG (Mannheim) v. VEB Bibliographisches Institut (Leipzig)
International Law Reports
1987
Nova Publishers
Focus on Catalysts
2007
Future Attack Patterns
Information Security of Highly Critical Wireless Networks
2017
Patent Selections
Recent Patents on Computer Science
2009
U.S. Army's Modular Redesign: Issues for Congress. CRS Report for Congress
PsycEXTRA Dataset
2005
Measurement of Unit Activity in Various Systems of the Brain Postoperatively A Preliminary Study
Stereotactic and Functional Neurosurgery
1970
Introduction
Wide-Band-Gap Semiconductors
1993
UOP to develop biofuel technology for military jets
Focus on Catalysts
2007
Investigations Into the Application of NMS Tools to Modeling the Global Information Grid (GIG)
Unknown Venue
2005
Governance and Management Frameworks
Information Security of Highly Critical Wireless Networks
2017
Factors Important in Developing Regional Steel Corrosion Models
i-manager's Journal on Structural Engineering
2012
The preparation and storage of anaesthetic drugs for obstetric emergencies: a survey of UK practice
International Journal of Obstetric Anesthesia
2009
Modeling Threats and Risks
Information Security of Highly Critical Wireless Networks
2017
Known Weaknesses with Security Controls
Information Security of Highly Critical Wireless Networks
2017
Examples in Brief
Information Security of Highly Critical Wireless Networks
2017
Modeling Vulnerabilities
Information Security of Highly Critical Wireless Networks
2017
What Is Highly Critical Wireless Networking (HCWN)
Information Security of Highly Critical Wireless Networks
2017
Applications for HCWN
Information Security of Highly Critical Wireless Networks
2017
Security Technologies for Networked Devices
Information Security of Highly Critical Wireless Networks
2017
Assessing the Effectiveness and Efficiency of Security Approaches
Information Security of Highly Critical Wireless Networks
2017
Competent Reliable Operation of HCWN
Information Security of Highly Critical Wireless Networks
2017
Testing the Resilience of HCWN
Information Security of Highly Critical Wireless Networks
2017
General principles and safe paediatric anaesthesia
Core Topics in Paediatric Anaesthesia
2013
Aspects of non-classical organolanthanide chemistry
Journal of Organometallic Chemistry
2002
News
Neuroscience Research
1994
TET Summer 1992: Environmental Measurements
Unknown Venue
1993
Strategy for OCRWM to provide training assistance to state, tribal, and local governments
Unknown Venue
1992
12 Positron-emission tomography (PET)Molecular imagingpositron-emission tomography (PET)Molecular Imaging: PET and SPECT
Brain Tumor Imaging
2016
Documents
Terrorism
1979

Education

George Mason University

Cyber Security / May, 2001

Fairfax, Virginia, United States of America

Experience

University of Maryland, Global Campus

Cybersecurity Researcher / March, 2004May, 2009

Researcher for cyber vulnerabilities for military systems, EMP, nanotechnology, Artificial intelligence

Program Director for Cybersecurity / August, 2023January, 2023

Lead for adapting CSTEM department to include Artificial Intelligence into classrooms.

Join Clay on NotedSource!
Join Now

At NotedSource, we believe that professors, post-docs, scientists and other researchers have deep, untapped knowledge and expertise that can be leveraged to drive innovation within companies. NotedSource is committed to bridging the gap between academia and industry by providing a platform for collaboration with industry and networking with other researchers.

For industry, NotedSource identifies the right academic experts in 24 hours to help organizations build and grow. With a platform of thousands of knowledgeable PhDs, scientists, and industry experts, NotedSource makes connecting and collaborating easy.

For academic researchers such as professors, post-docs, and Ph.D.s, NotedSource provides tools to discover and connect to your colleagues with messaging and news feeds, in addition to the opportunity to be paid for your collaboration with vetted partners.

Expert Institutions
NotedSource has experts from Stanford University
Expert institutions using NotedSource include Oxfort University
Experts from McGill have used NotedSource to share their expertise
University of Chicago experts have used NotedSource
MIT researchers have used NotedSource
Proudly trusted by
Microsoft uses NotedSource for academic partnerships
Johnson & Johnson academic research projects on NotedSource
ProQuest (Clarivate) uses NotedSource as their industry academia platform
Slamom consulting engages academics for research collaboration on NotedSource
Omnicom and OMG find academics on notedsource
Unilever research project have used NotedSource to engage academic experts

Connect with researchers and scientists like Dr. Clay Wilson, Ph.D. on NotedSource to help your company with innovation, research, R&D, L&D, and more.