Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Clay Wilson is active.

Publication


Featured researches published by Clay Wilson.


Archive | 2017

Information Security of Highly Critical Wireless Networks

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

The first € price and the £ and


Archive | 2013

Cybersecurity and Cyber Weapons: Is Nonproliferation Possible?

Clay Wilson

price are net prices, subject to local VAT. Prices indicated with * include VAT for books; the €(D) includes 7% for Germany, the €(A) includes 10% for Austria. Prices indicated with ** include VAT for electronic products; 19% for Germany, 20% for Austria. All prices exclusive of carriage charges. Prices and other details are subject to change without notice. All errors and omissions excepted. M. Martellini, S. Abaimov, S. Gaycken, C. Wilson Information Security of Highly Critical Wireless Networks


Archive | 2017

Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

“Cybersecurity and Cyber Weapons: is Nonproliferation possible?” by Clay Wilson, deals with the argument that several international organizations now describe malicious codes as a Weapons of Mass Destruction (WMD), and argue that nations are entering a new cyber arms race. Dr. Wilson questions whether it is possible to manage the global spread of malicious cyber weapons by using methods for nonproliferation in the ways they were used to control traditional nuclear weapons. The paper also discusses emerging threats from malicious cyber code, and describes characteristics of cyber weapons that some organizations now classify as Weapons of Mass Destruction, similar to Chemical, Biological, Radiological, or Nuclear (CBRN) WMD.


Archive | 2017

Governance and Management Frameworks

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

Historically, technology advances and increase in productivity led to revolutionary societal changes and industrial development. The first industrial revolution created machines to replace hand work and invented steam engine to decrease hard labor. The ambitious engineer thought catalyzed the second industrial revolution, electrification increased the working hours and assembly lines enhanced mass production in the beginning of the twentieth century. While its second part witnessed a real breakthrough in computer engineering, and industrial automation spread exponentially taking over the manual controls; cyberspace ensured global digital communication, mobile connection, and e-commerce. Electronics and internet technologies created the thirst industrial revolution. The beginning of the XXI century is operating with such realities as Internet of Things, Robotics, Virtual Reality, Cyber Warfare, and Industry 4.0.


Archive | 2017

Security Technologies for Networked Devices

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

Wireless networks are governed by a variety of regulations that are intended to cover safe operation of emergency communications and medical devices.


Archive | 2017

Testing the Resilience of HCWN

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

To protect against “man-in-the-middle” attacks, wherein a hacker eavesdrops on messages between two or more nodes and relays or modifies messages so that the legitimate nodes are deceived into thinking they are talking directly to one another. To protect from such attacks, a successful information assurance strategy must make the mere reception of a signal useless to a would-be hacker.


Archive | 2017

Competent Reliable Operation of HCWN

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

The wireless technologies, since their birth in 1890, have revolutionized our life style and provided freedom and liberty in remote data procession and management, both in civilian and military areas. After more than a century of evolution, wireless technology is adopted globally due to its advantages and ease of use in communication and data transfer, and wireless interconnectivity surrounds us on a daily basis, from wireless CCTV cameras to smartphones.


Archive | 2017

Modeling Threats and Risks

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

Telemetry is the automatic transmission and measurement of data from remote sources by wire or radio or other means. It is also used to send commands, programs and receives monitoring information from these terminal locations. Supervisory Control and Data Acquisition (SCADA) systems use a combination of telemetry and data acquisition. SCADA is used for collecting information, transferring it to a central management site, carrying out any necessary data analysis and control operations, and then displaying the status information back onto the operator screens.


Archive | 2017

Known Weaknesses with Security Controls

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

Scanning of critical infrastructure networks is done for intelligence gathering for industrial espionage or for making preparations to direct a future cyberattack. Trend Micro officials reportedly have stated that, “We have observed increased interest in [scanning of] SCADA protocols …” for critical infrastructure and industrial systems.


Archive | 2017

Applications for HCWN

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson

Richard Clarke, former White House advisor on cybersecurity, has reportedly warned that there is evidence that China has been actively probing and hacking wireless networks that control the United States power grid. Clarke points out, “The only point to penetrating the grid’s controls is to counter American military superiority by threatening to damage the underpinning of the U.S. economy. Chinese military strategists have written about how in this way a nation like China could gain an equal footing with the militarily superior United States”.

Collaboration


Dive into the Clay Wilson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stanislav Abaimov

University of Rome Tor Vergata

View shared research outputs
Top Co-Authors

Avatar

Sandro Gaycken

European School of Management and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge