Dr. Clay Wilson, Ph.D.

Program Director for Cybersecurity, Lead for AI policy

Research Interests

Artificial Intelligence
AI
EMP
cybersecurity
cyber terrorism
Human-Computer Interaction
Computer Graphics and Computer-Aided Design
Software
Neurology (clinical)
Surgery
Anesthesiology and Pain Medicine
Obstetrics and Gynecology
Inorganic Chemistry
Materials Chemistry
Organic Chemistry
Physical and Theoretical Chemistry
Biochemistry
Pharmaceutical Science

About

**Highly innovative, accomplished and visionary Leader with extensive experience in the advanced technical Cyber Security & Artificial Intelligence space focused on building robust governance, infrastructure, policies and procedures.  Expertise in developing and championing graduate level programs within the academic community. Demonstrated effectiveness in cultivating relationships with diverse levels of professionals within private, public, academic and government sectors.**

Publications

Congressional Research Service

Congress A to Z / Jan 01, 2008

Congressional Research Service. (2008). In Congress A to Z. CQ Press. https://doi.org/10.4135/9781483300498.n92

Deception in Defense of Computer Systems from Cyber Attack

Cyber Warfare and Cyber Terrorism / Jan 01, 2007

Rowe, N. C. (2007). Deception in Defense of Computer Systems from Cyber Attack. In Cyber Warfare and Cyber Terrorism (pp. 97–104). IGI Global. https://doi.org/10.4018/978-1-59140-991-5.ch013

IEDs in “New Wars”

Improvised Explosive Devices / Jan 01, 2016

Revill, J. (2016). IEDs in “New Wars.” In Improvised Explosive Devices (pp. 59–76). Springer International Publishing. https://doi.org/10.1007/978-3-319-33834-7_4

12 A special HEMP-resilient protection and automation devices

Protecting Electrical Equipment / Feb 22, 2021

12 A special HEMP-resilient protection and automation devices. (2021). In Protecting Electrical Equipment (pp. 144–196). De Gruyter. https://doi.org/10.1515/9783110723144-012

Oceans and coastal resources : a briefing book / Oceans and Coastal Management Issues Team, Congressional Research Service.

Jan 01, 1993

(1993). Oceans and coastal resources : a briefing book / Oceans and Coastal Management Issues Team, Congressional Research Service. Congressional Research Service, Library of Congress,. https://doi.org/10.5962/bhl.title.45967

Nuclear Capabilities of North Korea

National Security Issues in Science, Law, and Technology / Apr 16, 2007

Johnson, T. (2007). Nuclear Capabilities of North Korea: Issues in Intelligence Collection, Analysis, and National Security Policy. In National Security Issues in Science, Law, and Technology (pp. 97–119). CRC Press. https://doi.org/10.1201/9781420019087.ch5

Network-Centric Service-Oriented Enterprises

Network-Centric Service-Oriented Enterprise / Jan 01, 2007

Network-Centric Service-Oriented Enterprises. (2007). In Network-Centric Service-Oriented Enterprise (pp. 449–500). Springer Netherlands. https://doi.org/10.1007/978-1-4020-6456-2_10

Cyberwar and its Borders

Cyberwar and Information Warfare / Aug 08, 2011

Cyberwar and its Borders. (2011, August 8). Cyberwar and Information Warfare; Wiley; Portico. https://doi.org/10.1002/9781118603482.ch1

Cyber Threats to Critical Information Infrastructure

Cyberterrorism / Jan 01, 2014

Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. In Cyberterrorism (pp. 123–136). Springer New York. https://doi.org/10.1007/978-1-4939-0962-9_7

Cyber Crime

Cyberpower and National Security / Mar 01, 2011

Wilson, C. (2011). Cyber Crime. In Cyberpower and National Security (pp. 415–436). University of Nebraska Press. https://doi.org/10.2307/j.ctt1djmhj1.23

Cognitive and synthetic behavior of avatars in intelligent virtual environments

Virtual Reality / Mar 01, 2008

Liang, R., Zhang, M., Liu, Z., & Krokos, M. (2008). Cognitive and synthetic behavior of avatars in intelligent virtual environments. Virtual Reality, 12(1), 47–54. https://doi.org/10.1007/s10055-008-0089-7

AVACHAT

Proceedings of the 2008 ACM symposium on Virtual reality software and technology / Oct 27, 2008

Park, S.-H., Ji, S.-H., Ryu, D.-S., & Cho, H.-G. (2008, October 27). AVACHAT: a new comic-based chat system for virtual avatars. Proceedings of the 2008 ACM Symposium on Virtual Reality Software and Technology. https://doi.org/10.1145/1450579.1450652

The Economic Impact of a Terrorist Attack

Securing Utility and Energy Infrastructures / Apr 10, 2006

The Economic Impact of a Terrorist Attack. (2006, April 10). Securing Utility and Energy Infrastructures; Wiley; Portico. https://doi.org/10.1002/0470054549.ch2

Improvised Explosive Devices in Iraq, 2003-09: A Case of Operational Surprise and Institutional Response

Apr 01, 2011

Smith, A. (2011). Improvised Explosive Devices in Iraq, 2003-09: A Case of Operational Surprise and Institutional Response. Defense Technical Information Center. https://doi.org/10.21236/ada542983

Report by the United States

Trade Policy Reviews / Aug 01, 2008

(2008). Report by the United States. In Trade Policy Review: United States of America 2008 (pp. 196–230). WTO. https://doi.org/10.30875/fed26ed2-en

Artificial Intelligence and Warfare

21st Century Prometheus / Jan 01, 2020

Wilson, C. (2020). Artificial Intelligence and Warfare. In 21st Century Prometheus (pp. 125–140). Springer International Publishing. https://doi.org/10.1007/978-3-030-28285-1_7

Testing, Defining and Delivering Nuclear Weapons

The Politics of Nuclear Weapons / Jan 01, 2015

Testing, Defining and Delivering Nuclear Weapons. (2015). In The Politics of Nuclear Weapons (pp. 30–48). SAGE Publications Ltd. https://doi.org/10.4135/9781473917170.n3

News

Pharmaceutical Patent Analyst / May 01, 2013

News. (2013). Pharmaceutical Patent Analyst, 2(3), 299–301. https://doi.org/10.4155/ppa.13.28

Terrorism and Cybercrime

May 01, 2008

Chargualaf, J., & Joseph. (2008). Terrorism and Cybercrime. Defense Technical Information Center. https://doi.org/10.21236/ada488040

Strategic Governance of IEDs

Improvised Explosive Devices / Jan 01, 2016

Revill, J. (2016). Strategic Governance of IEDs. In Improvised Explosive Devices (pp. 91–109). Springer International Publishing. https://doi.org/10.1007/978-3-319-33834-7_6

Cybersecurity and Cyber Weapons: Is Nonproliferation Possible?

Cyber Security / Jan 01, 2013

Wilson, C. (2013). Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? In SpringerBriefs in Computer Science (pp. 11–24). Springer International Publishing. https://doi.org/10.1007/978-3-319-02279-6_2

Conclusion

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Conclusion. In SpringerBriefs in Computer Science (pp. 71–73). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_16

Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0. In SpringerBriefs in Computer Science (pp. 63–69). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_15

The Legal Regulations of E-Government

2011 International Conference on Management and Service Science / Aug 01, 2011

He, Z. (2011, August). The Legal Regulations of E-Government. 2011 International Conference on Management and Service Science. https://doi.org/10.1109/icmss.2011.5999430

Cyber Conflict

Current and Emerging Trends in Cyber Operations

Applegate, S. (n.d.). Cyber Conflict. In Current and Emerging Trends in Cyber Operations. Palgrave Macmillan. https://doi.org/10.1057/9781137455550.0006

Vulnerabilities and Security Issues

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Vulnerabilities and Security Issues. In SpringerBriefs in Computer Science (pp. 11–15). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_4

US-China Relations

Advances in Digital Crime, Forensics, and Cyber Terrorism / Jan 01, 2016

Wilson, C., & Drumhiller, N. (2016). US-China Relations: Cyber Espionage and Cultural Bias. In National Security and Counterintelligence in the Era of Cyber Espionage (pp. 28–46). IGI Global. https://doi.org/10.4018/978-1-4666-9661-7.ch002

Bibliographisches Institut AG (Mannheim) v. VEB Bibliographisches Institut (Leipzig)

International Law Reports / Jan 01, 1987

Bibliographisches Institut AG (Mannheim) v. VEB Bibliographisches Institut (Leipzig). (1987). International Law Reports, 72, 26–28. https://doi.org/10.1017/cbo9781316152003.008

Nova Publishers

Focus on Catalysts / Jan 01, 2007

Nova Publishers. (2007). Focus on Catalysts, 2007(1), 8. https://doi.org/10.1016/s1351-4180(06)72048-7

Future Attack Patterns

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Future Attack Patterns. In SpringerBriefs in Computer Science (pp. 59–62). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_14

Patent Selections

Recent Patents on Computer Science / Jan 16, 2009

Publishers. (2009). Patent Selections. Recent Patents on Computer Science, 2(1), 86–90. https://doi.org/10.2174/1874479600902010086

U.S. Army's Modular Redesign: Issues for Congress. CRS Report for Congress

PsycEXTRA Dataset / Jan 01, 2005

Feickert, A. (2005). U.S. Army’s Modular Redesign: Issues for Congress. CRS Report for Congress: (456652006-001) [dataset]. In PsycEXTRA Dataset. American Psychological Association (APA). https://doi.org/10.1037/e456652006-001

Measurement of Unit Activity in Various Systems of the Brain Postoperatively A Preliminary Study

Stereotactic and Functional Neurosurgery / Jan 01, 1970

Marg, E., Chow, R., Perkins, R. K., Olsen, E. R., & Wilson, C. B. (1970). Measurement of Unit Activity in Various Systems of the Brain Postoperatively A Preliminary Study. Stereotactic and Functional Neurosurgery, 32(1), 53–62. Portico. https://doi.org/10.1159/000103394

Introduction

Wide-Band-Gap Semiconductors / Jan 01, 1993

Van de Walle, C. G. (1993). Introduction. In Wide-Band-Gap Semiconductors (pp. ix–x). Elsevier. https://doi.org/10.1016/b978-0-444-81573-6.50004-9

UOP to develop biofuel technology for military jets

Focus on Catalysts / Aug 01, 2007

UOP to develop biofuel technology for military jets. (2007). Focus on Catalysts, 2007(8), 2. https://doi.org/10.1016/s1351-4180(07)70420-8

Investigations Into the Application of NMS Tools to Modeling the Global Information Grid (GIG)

Apr 30, 2005

Doshi, B., & Cole, R. G. (2005). Investigations Into the Application of NMS Tools to Modeling the Global Information Grid (GIG). Defense Technical Information Center. https://doi.org/10.21236/ada441364

Governance and Management Frameworks

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Governance and Management Frameworks. In SpringerBriefs in Computer Science (pp. 21–23). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_7

Factors Important in Developing Regional Steel Corrosion Models

i-manager's Journal on Structural Engineering / Aug 15, 2012

O’dea, M., C. Graham, F., & H. Mccuen, R. (2012). Factors Important in Developing Regional Steel Corrosion Models. I-Manager’s Journal on Structural Engineering, 1(2), 1–10. https://doi.org/10.26634/jste.1.2.1926

The preparation and storage of anaesthetic drugs for obstetric emergencies: a survey of UK practice

International Journal of Obstetric Anesthesia / Jul 01, 2009

Stone, J. P., Fenner, L. B., & Christmas, T. R. (2009). The preparation and storage of anaesthetic drugs for obstetric emergencies: a survey of UK practice. International Journal of Obstetric Anesthesia, 18(3), 242–248. https://doi.org/10.1016/j.ijoa.2009.01.013

Modeling Threats and Risks

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Modeling Threats and Risks. In SpringerBriefs in Computer Science (pp. 17–18). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_5

Known Weaknesses with Security Controls

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Known Weaknesses with Security Controls. In SpringerBriefs in Computer Science (pp. 27–28). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_9

Examples in Brief

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Examples in Brief. In SpringerBriefs in Computer Science (pp. 33–35). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_12

Modeling Vulnerabilities

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Modeling Vulnerabilities. In SpringerBriefs in Computer Science (pp. 19–20). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_6

What Is Highly Critical Wireless Networking (HCWN)

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). What Is Highly Critical Wireless Networking (HCWN). In SpringerBriefs in Computer Science (pp. 3–5). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_2

Applications for HCWN

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Applications for HCWN. In SpringerBriefs in Computer Science (pp. 7–10). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_3

Security Technologies for Networked Devices

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Security Technologies for Networked Devices. In SpringerBriefs in Computer Science (pp. 25–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_8

Assessing the Effectiveness and Efficiency of Security Approaches

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Assessing the Effectiveness and Efficiency of Security Approaches. In SpringerBriefs in Computer Science (pp. 31–32). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_11

Competent Reliable Operation of HCWN

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Competent Reliable Operation of HCWN. In SpringerBriefs in Computer Science (pp. 29–30). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_10

Testing the Resilience of HCWN

Information Security of Highly Critical Wireless Networks / Jan 01, 2017

Martellini, M., Abaimov, S., Gaycken, S., & Wilson, C. (2017). Testing the Resilience of HCWN. In SpringerBriefs in Computer Science (pp. 37–58). Springer International Publishing. https://doi.org/10.1007/978-3-319-52905-9_13

General principles and safe paediatric anaesthesia

Core Topics in Paediatric Anaesthesia / Jul 04, 2013

James, I. (2013). General principles and safe paediatric anaesthesia. In Core Topics in Paediatric Anaesthesia (pp. 96–105). Cambridge University Press. https://doi.org/10.1017/cbo9780511978906.012

Aspects of non-classical organolanthanide chemistry

Journal of Organometallic Chemistry / Mar 01, 2002

Cristina Cassani, M., Gun’ko, Y. K., Hitchcock, P. B., Hulkes, A. G., Khvostov, A. V., Lappert, M. F., & Protchenko, A. V. (2002). Aspects of non-classical organolanthanide chemistry. Journal of Organometallic Chemistry, 647(1–2), 71–83. https://doi.org/10.1016/s0022-328x(01)01484-x

News

Neuroscience Research / Sep 01, 1994

News. (1994). Neuroscience Research, 20(3), 287–288. https://doi.org/10.1016/0168-0102(94)90099-x

TET Summer 1992: Environmental Measurements

Nov 01, 1993

Gunn, J. T., Dewey, R. K., Rubenstein, D., & Wilson, C. (1993). TET Summer 1992: Environmental Measurements. Defense Technical Information Center. https://doi.org/10.21236/ada273060

Strategy for OCRWM to provide training assistance to state, tribal, and local governments

Nov 01, 1992

none. (1992). Strategy for OCRWM to provide training assistance to state, tribal, and local governments. Office of Scientific and Technical Information (OSTI). https://doi.org/10.2172/7025582

12 Positron-emission tomography (PET)Molecular imagingpositron-emission tomography (PET)Molecular Imaging: PET and SPECT

Brain Tumor Imaging / Jan 01, 2016

Jain, R., & Essig, M. (Eds.). (2016). 12 Positron-emission tomography (PET)Molecular imagingpositron-emission tomography (PET)Molecular Imaging: PET and SPECT. In Brain Tumor Imaging. Georg Thieme Verlag. https://doi.org/10.1055/b-0035-122303

Documents

Terrorism / Jan 01, 1979

Documents. (1979). Terrorism, 2(1–2), 139–147. https://doi.org/10.1080/10576107908435429

Documents

Terrorism / Jan 01, 1979

Documents. (1979). Terrorism, 2(1–2), 139–147. https://doi.org/10.1080/10576107908435429

Documents

Terrorism / Jan 01, 1979

Documents. (1979). Terrorism, 2(1–2), 139–147. https://doi.org/10.1080/10576107908435429

Education

George Mason University

Cyber Security / May, 2001

Fairfax, Virginia, United States of America

Experience

University of Maryland, Global Campus

Cybersecurity Researcher / March, 2004May, 2009

Researcher for cyber vulnerabilities for military systems, EMP, nanotechnology, Artificial intelligence

Program Director for Cybersecurity / August, 2023January, 2023

Lead for adapting CSTEM department to include Artificial Intelligence into classrooms.

Join Clay on NotedSource!
Join Now

At NotedSource, we believe that professors, post-docs, scientists and other researchers have deep, untapped knowledge and expertise that can be leveraged to drive innovation within companies. NotedSource is committed to bridging the gap between academia and industry by providing a platform for collaboration with industry and networking with other researchers.

For industry, NotedSource identifies the right academic experts in 24 hours to help organizations build and grow. With a platform of thousands of knowledgeable PhDs, scientists, and industry experts, NotedSource makes connecting and collaborating easy.

For academic researchers such as professors, post-docs, and Ph.D.s, NotedSource provides tools to discover and connect to your colleagues with messaging and news feeds, in addition to the opportunity to be paid for your collaboration with vetted partners.

Expert Institutions
NotedSource has experts from Stanford University
Expert institutions using NotedSource include Oxfort University
Experts from McGill have used NotedSource to share their expertise
University of Chicago experts have used NotedSource
MIT researchers have used NotedSource
Proudly trusted by
Microsoft uses NotedSource for academic partnerships
Johnson & Johnson academic research projects on NotedSource
ProQuest (Clarivate) uses NotedSource as their industry academia platform
Slamom consulting engages academics for research collaboration on NotedSource
Omnicom and OMG find academics on notedsource
Unilever research project have used NotedSource to engage academic experts