Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress C Wilson Focus on Terrorism 9 (1), 1-42, 2003 | 201 | 2003 |
Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress C Wilson Congressional Research Service, 2008 | 186 | 2008 |
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments C Wilson, Foreign Affairs, Defense, and Trade Division Congressional Research Service, Library of Congress, 2006 | 137 | 2006 |
Improvised explosive devices (IEDs) in Iraq and Afghanistan: effects and countermeasures C Wilson, Foreign Affairs, Defense, and Trade Division Congressional Research Service, Library of Congress, 2007 | 132 | 2007 |
Network centric warfare: background and oversight issues for Congress C Wilson, Foreign Affairs, Defense, and Trade Division Congressional Information Service, Library of Congress, 2004 | 120 | 2004 |
Terrorist capabilities for cyberattack: Overview and policy issues J Rollins, C Wilson Washington, DC, 2007 | 104 | 2007 |
Network centric operations: background and oversight issues for congress C Wilson Congressional Research Service, 2007 | 91 | 2007 |
Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues C Wilson Congressional Research Service, 2007 | 54 | 2007 |
Cyber threats to critical information infrastructure C Wilson Cyberterrorism: Understanding, Assessment, and Response, 123-136, 2014 | 51 | 2014 |
Cyber crime C Wilson Cyberpower and national security 415, 2009 | 29 | 2009 |
Avatars C Wilson Virtual Reality Technology, and the US Military: Emerging Policy Issues, 4-12, 2008 | 28 | 2008 |
Avatars, virtual reality technology, and the US military: Emerging policy issues C Wilson Congressional Research Service, 2008 | 28 | 2008 |
Information Operations and Cyberwar: Capabilities and Related Policy Issues C Wilson Congressional Research Service, Library of Congress, 2006 | 28 | 2006 |
Terrorist capabilities for cyber-attack C Wilson International CIIP Handbook 2, 69-88, 2006 | 26 | 2006 |
Use of relocatable stereotactic frame to integrate positron emission tomography and computed tomography images: application in human malignant brain tumours DGT Thomas, SS Gill, CB Wilson, JL Darling, CS Parkins Stereotactic and Functional Neurosurgery 54 (1-8), 388-392, 1990 | 23 | 1990 |
Cyberterrorism: Vulnerabilities and policy issues for congress C Wilson, C Botnets Foreign Affairs, Defense, and Trade Division, United States Governemnt, CRS …, 2008 | 22 | 2008 |
Information Operations C Wilson Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues …, 2007 | 21 | 2007 |
Artificial intelligence and warfare C Wilson 21st Century Prometheus: Managing CBRN Safety and Security Affected by …, 2020 | 18 | 2020 |
Improvised explosive devices (IEDs) in Iraq: Effects and countermeasures C Wilson Congressional Research Service, the Library of Congress, 2006 | 18 | 2006 |
Improvised explosive devices in Iraq: effects and countermeasures C Wilson Congressional Research Service, the Library of Congress, 2005 | 14 | 2005 |