Subjects -> TRANSPORTATION (Total: 216 journals)
    - AIR TRANSPORT (9 journals)
    - AUTOMOBILES (26 journals)
    - RAILROADS (10 journals)
    - ROADS AND TRAFFIC (9 journals)
    - SHIPS AND SHIPPING (39 journals)
    - TRANSPORTATION (123 journals)

TRANSPORTATION (123 journals)                     

Showing 1 - 53 of 53 Journals sorted alphabetically
Accident Analysis & Prevention     Hybrid Journal   (Followers: 122)
Analytic Methods in Accident Research     Hybrid Journal   (Followers: 9)
Applied Mobilities     Hybrid Journal   (Followers: 3)
Archives of Transport     Open Access   (Followers: 18)
Asian Transport Studies     Open Access   (Followers: 1)
Botswana Journal of Technology     Full-text available via subscription   (Followers: 1)
Case Studies on Transport Policy     Hybrid Journal   (Followers: 16)
Cities in the 21st Century     Open Access   (Followers: 16)
Danish Journal of Transportation Research / Dansk Tidsskrift for Transportforskning     Open Access   (Followers: 3)
Decision Making : Applications in Management and Engineering     Open Access   (Followers: 2)
Economics of Transportation     Partially Free   (Followers: 14)
Emission Control Science and Technology     Hybrid Journal   (Followers: 2)
eTransportation     Open Access   (Followers: 2)
EURO Journal of Transportation and Logistics     Hybrid Journal   (Followers: 15)
European Transport Research Review     Open Access   (Followers: 24)
Geosystem Engineering     Hybrid Journal   (Followers: 2)
IATSS Research     Open Access  
IEEE Open Journal of Intelligent Transportation Systems     Open Access   (Followers: 8)
IEEE Vehicular Technology Magazine     Full-text available via subscription   (Followers: 7)
IET Electrical Systems in Transportation     Open Access   (Followers: 11)
IET Intelligent Transport Systems     Open Access   (Followers: 12)
IET Smart Cities     Open Access  
IFAC-PapersOnLine     Open Access   (Followers: 1)
International Journal of Applied Logistics     Full-text available via subscription   (Followers: 11)
International Journal of Crashworthiness     Hybrid Journal   (Followers: 12)
International Journal of e-Navigation and Maritime Economy     Open Access   (Followers: 6)
International Journal of Electric and Hybrid Vehicles     Hybrid Journal   (Followers: 11)
International Journal of Electronic Transport     Hybrid Journal   (Followers: 9)
International Journal of Heavy Vehicle Systems     Hybrid Journal   (Followers: 7)
International Journal of Intelligent Transportation Systems Research     Hybrid Journal   (Followers: 16)
International Journal of Mobile Communications     Hybrid Journal   (Followers: 9)
International Journal of Ocean Systems Management     Hybrid Journal   (Followers: 3)
International Journal of Physical Distribution & Logistics Management     Hybrid Journal   (Followers: 12)
International Journal of Services Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Sustainable Transportation     Hybrid Journal   (Followers: 19)
International Journal of Traffic and Transportation Engineering     Open Access   (Followers: 19)
International Journal of Transportation Engineering     Open Access   (Followers: 2)
International Journal of Transportation Science and Technology     Open Access   (Followers: 12)
International Journal of Vehicle Systems Modelling and Testing     Hybrid Journal   (Followers: 3)
Journal of Advanced Transportation     Hybrid Journal   (Followers: 16)
Journal of Big Data Analytics in Transportation     Hybrid Journal   (Followers: 2)
Journal of Intelligent and Connected Vehicles     Open Access   (Followers: 2)
Journal of Mechatronics, Electrical Power, and Vehicular Technology     Open Access   (Followers: 6)
Journal of Modern Transportation     Full-text available via subscription   (Followers: 9)
Journal of Navigation     Hybrid Journal   (Followers: 278)
Journal of Sport & Social Issues     Hybrid Journal   (Followers: 12)
Journal of Sustainable Mobility     Full-text available via subscription   (Followers: 3)
Journal of Traffic and Transportation Engineering (English Edition)     Open Access   (Followers: 5)
Journal of Transport & Health     Hybrid Journal   (Followers: 12)
Journal of Transport and Land Use     Open Access   (Followers: 26)
Journal of Transport and Supply Chain Management     Open Access   (Followers: 16)
Journal of Transport Geography     Hybrid Journal   (Followers: 28)
Journal of Transport History     Hybrid Journal   (Followers: 13)
Journal of Transportation and Logistics     Open Access   (Followers: 5)
Journal of Transportation Safety & Security     Hybrid Journal   (Followers: 10)
Journal of Transportation Security     Hybrid Journal   (Followers: 2)
Journal of Transportation Systems Engineering and Information Technology     Full-text available via subscription   (Followers: 12)
Journal of Transportation Technologies     Open Access   (Followers: 15)
Journal of Waterway Port Coastal and Ocean Engineering     Full-text available via subscription   (Followers: 8)
Journal on Vehicle Routing Algorithms     Hybrid Journal  
Les Dossiers du Grihl     Open Access   (Followers: 1)
LOGI ? Scientific Journal on Transport and Logistics     Open Access   (Followers: 1)
Logistics     Open Access   (Followers: 3)
Logistics & Sustainable Transport     Open Access   (Followers: 6)
Logistique & Management     Hybrid Journal  
Mobility in History     Full-text available via subscription   (Followers: 5)
Modern Transportation     Open Access   (Followers: 12)
Nonlinear Dynamics     Hybrid Journal   (Followers: 20)
Open Journal of Safety Science and Technology     Open Access   (Followers: 17)
Open Transportation Journal     Open Access   (Followers: 1)
Packaging, Transport, Storage & Security of Radioactive Material     Hybrid Journal   (Followers: 4)
Periodica Polytechnica Transportation Engineering     Open Access  
Pervasive and Mobile Computing     Hybrid Journal   (Followers: 8)
Proceedings of the Institution of Mechanical Engineers Part F: Journal of Rail and Rapid Transit     Hybrid Journal   (Followers: 15)
Promet : Traffic &Transportation     Open Access  
Public Transport     Hybrid Journal   (Followers: 20)
Recherche Transports Sécurité     Hybrid Journal   (Followers: 1)
Research in Transportation Business and Management     Partially Free   (Followers: 8)
Revista Transporte y Territorio     Open Access   (Followers: 1)
Revue Marocaine de Management, Logistique et Transport     Open Access  
Romanian Journal of Transport Infrastructure     Open Access   (Followers: 1)
SourceOCDE Transports     Full-text available via subscription   (Followers: 2)
Sport, Education and Society     Hybrid Journal   (Followers: 13)
Sport, Ethics and Philosophy     Hybrid Journal   (Followers: 3)
Streetnotes     Open Access   (Followers: 1)
Synthesis Lectures on Mobile and Pervasive Computing     Full-text available via subscription   (Followers: 1)
Tire Science and Technology     Full-text available via subscription   (Followers: 3)
Transactions on Transport Sciences     Open Access   (Followers: 7)
Transport     Open Access   (Followers: 17)
Transport and Telecommunication     Open Access   (Followers: 5)
Transport in Porous Media     Hybrid Journal   (Followers: 2)
Transport Problems     Open Access   (Followers: 5)
Transport Reviews: A Transnational Transdisciplinary Journal     Hybrid Journal   (Followers: 10)
Transport technic and technology     Open Access   (Followers: 1)
Transportation     Hybrid Journal   (Followers: 34)
Transportation Engineering     Open Access   (Followers: 2)
Transportation Geotechnics     Full-text available via subscription   (Followers: 1)
Transportation in Developing Economies     Hybrid Journal  
Transportation Infrastructure Geotechnology     Hybrid Journal   (Followers: 8)
Transportation Journal     Full-text available via subscription   (Followers: 17)
Transportation Letters : The International Journal of Transportation Research     Hybrid Journal   (Followers: 6)
Transportation Research Interdisciplinary Perspectives     Open Access   (Followers: 3)
Transportation Research Part A: Policy and Practice     Hybrid Journal   (Followers: 41)
Transportation Research Part B: Methodological     Hybrid Journal   (Followers: 39)
Transportation Research Part C: Emerging Technologies     Hybrid Journal   (Followers: 31)
Transportation Research Procedia     Open Access   (Followers: 7)
Transportation Research Record : Journal of the Transportation Research Board     Full-text available via subscription   (Followers: 36)
Transportation Safety and Environment     Open Access   (Followers: 2)
Transportation Science     Full-text available via subscription   (Followers: 26)
Transportation Systems and Technology     Open Access  
TRANSPORTES     Open Access   (Followers: 6)
Transportmetrica A : Transport Science     Hybrid Journal   (Followers: 9)
Transportmetrica B : Transport Dynamics     Hybrid Journal   (Followers: 1)
Transportrecht     Hybrid Journal   (Followers: 1)
Travel Behaviour and Society     Full-text available via subscription   (Followers: 12)
Travel Medicine and Infectious Disease     Hybrid Journal   (Followers: 4)
Urban Development Issues     Open Access   (Followers: 3)
Urban, Planning and Transport Research     Open Access   (Followers: 33)
Vehicles     Open Access  
Vehicular Communications     Full-text available via subscription   (Followers: 4)
World Electric Vehicle Journal     Open Access  
World Review of Intermodal Transportation Research     Hybrid Journal   (Followers: 6)
Транспортні системи та технології перевезень     Open Access  

           

Similar Journals
Journal Cover
Journal of Transportation Security
Journal Prestige (SJR): 0.211
Number of Followers: 2  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1938-775X - ISSN (Online) 1938-7741
Published by Springer-Verlag Homepage  [2653 journals]
  • Developing critical thinking skills among Transportation Security officers
           (TSOs) through sharing tacit knowledge
    • Abstract: This paper summarizes results from a research project collaboration between a Transportation Security Administration (TSA) organization responsible for aviation security at a mid-sized airport in the western United States and a local university. The purpose of this project was to explore the potential and utility of a learning tool designed to enhance critical thinking skills among Transportation Security Officers (TSO). Employees of the TSA are provided comprehensive and continuous training from point of hire throughout the duration of a TSO’s employment. However performance problems continue to be identified and while TSOs are annually rated on their ability to think critically no training is provided for this specific skill. During Phase 1 of this two-phased study, a learning tool was developed in the form of a situational judgment test based tacit knowledge inventory comprised of work scenarios that were oriented on developing critical thinking skills common to TSOs. In Phase 2, TSOs organized into an experimental group, participated in structured facilitated discussions that supplemented the traditional training protocol and were based on the critical thinking tacit knowledge inventory; a control group took part in only the traditional training. A significant difference was found between the experimental and control group annual performance ratings for the critical thinking scale.
      PubDate: 2021-03-12
       
  • Cyber resilience of autonomous mobility systems: cyber-attacks and
           resilience-enhancing strategies
    • Abstract: The increasing cyber connectivity of vehicles and between vehicles and infrastructure will drastically reshape mobility in the coming decades. While the advent of connected mobility is expected to benefit travelers and the society by smoothing traffic, improving rider convenience, and reducing accidents, the augmented cyber components in connected and autonomous vehicles and related infrastructure also give rise to cyber-attacks to the transportation system. And yet, little attention has been paid to transportation cyber resilience. This paper thus proposes an investigation on this topic with a comprehensive literature review. The cyber components and plausible autonomous mobility systems (AMS) operation scenarios are discussed, before identifying possible cyber-attacks to AMS at both vehicle and system levels. The discussion then moves to existing practices to enhance cybersecurity, and a number of strategies are investigated toward enhancing AMS cyber resilience. At the vehicle level, creating layers and separation to reduce cyber component connectivity and deploying an independent procedure for data collection and processing are important in vehicle design and manufacturing. At the system level, recommended strategies include keeping redundancy in transportation capacity, maintaining a separate road network, and deploying different sub-autonomous mobility systems.
      PubDate: 2021-03-08
       
  • A study of the U.S. domestic air transportation network: temporal
           evolution of network topology and robustness from 2001 to 2016
    • Abstract: The U.S. air transportation network (ATN) is critical to the mobility and the functioning of the United States. It is thus necessary to ensure that it is well-connected, efficient, robust, and secure. Despite extensive research on its topology, the temporal evolution of the network’s robustness remains largely unexplored. In the present paper, a methodology is proposed to identify long-term trends in the evolution of the network’s topology and robustness over time. The study of the U.S. domestic ATN’s robustness was performed based on annual flight data from 1996 to 2016 and network analytics were used to examine the effects of restructuring that followed the 9/11 events. Centrality measures were computed and a node deletion method was applied to assess the network’s tolerance to a targeted attack scenario. The outcome of this study indicated that the 9/11 terrorist attacks triggered vast restructuring of the network, in terms of efficiency and security. Air traffic expanded, as new airports and air routes were introduced, allowing the network to recover rapidly and become more efficient. Security concerns resulted in significant improvement of the network’s robustness. Since 2001, the global traffic and topological properties of the U.S. ATN have displayed continuous growth, due to the network’s expansion. On the other hand, the results suggest that although the system’s ability to sustain its operational level under extreme circumstances has lately improved, its tolerance to targeted attacks has deteriorated. The presented methodology has shown its potential to be applied on different network levels or different transportation networks, in order to provide a general perspective of the system’s vulnerabilities.
      PubDate: 2021-01-08
      DOI: 10.1007/s12198-020-00227-x
       
  • Introduction to the special issue on maritime security: current and future
           challenges
    • PubDate: 2020-12-07
      DOI: 10.1007/s12198-020-00226-y
       
  • Maritime trade and piracy in the Gulf of Aden and the Indian Ocean
           (1994–2017)
    • Abstract: From the 1990’s to early 2000’s, the modern face of maritime piracy has plagued the coast of Somalia impacting on one the world’s major shipping lanes of the international trade: The Gulf of Aden. In this article, we analyse pirates social and ethnical characteristics, their organisation and the evolution of piracy acts conducted during this period in this part of the world, a profit-making activity for the Somali pirates. The loss of billions of dollars for some strategic energy sectors (and for maritime economy as a whole) also led us to reflect on the way the International Community and National States have generally intervened with regards to this issue, particularly the most affected States. We therefore also investigate how the International Community combat maritime piracy in the Indian Ocean and the Gulf of Aden. In the end, we attempt to gauge these efficiency measures, comparing the economic cost of sea piracy with protection costs assumed by States and private actors.
      PubDate: 2020-12-01
      DOI: 10.1007/s12198-018-0190-4
       
  • Analysis of the global maritime transportation system as a layered network
    • Abstract: We model the global maritime transportation system as a multilayer network of sea routes and land routes that work together to deliver cargo on a global scale. The nodes of this network represent seaports and maritime chokepoints, and the arcs represent route segments at sea or on land, respectively. We construct our network using free, publicly available data from online sources, and we reverse engineer the global demand for container cargo transport. We use this layered network to identify important nodes from a connectivity standpoint. We also develop a flow-based model that directs the aggregate movement of goods between ports on the shortest and/or cheapest available route, and uses re-routing strategies if a route segment becomes impassable for container ships. We use this model to assess the impact of the loss of one or more container ports or maritime chokepoints. Using the base case of no disruptions, we measure the amount of goods that have to be re-routed in case of each disruption and the corresponding “cost” of doing so. Collectively, these results present a novel view of the security of transportation supply and set the stage for future work examining the global resilience of maritime transport systems.
      PubDate: 2020-12-01
      DOI: 10.1007/s12198-019-00204-z
       
  • Ensuring safety and security in employing drones at airports
    • Abstract: Currently, the use of civil drones at airports is statutorily prohibited in most countries. This is due to threats to safety associated with the flying of drones over such facilities. The research reported in this paper deals with the development of a method for enhancing the safety of the movement of drones and, in that context, a special system for managing the route of drones. The proposed system makes it possible to employ drones safely at airports via confining the zone of their flight to a strictly designated corridor. This should help stave off the threat of drones colliding with other, land and air, transportation vehicles employed at an airport, particular elements thereof, and people. The development of this system may create the conditions for the removal of existing restrictions on the use of drones at airports. In addition to providing boosts in safety, the system helps manage the route of a drone. To enable the practical use of the proposed route management system, the authors have developed a special methodology for deploying it at airports.
      PubDate: 2020-11-05
      DOI: 10.1007/s12198-020-00225-z
       
  • Intermodal maritime supply chains: assessing factors for resiliency and
           security
    • Abstract: Much of the value exchanged in international trade is transported as containerized freight. While this transport mode has become ubiquitous for manufactured goods, offering a fast and efficient service, it does pose security threats in the post-9/11 era. Even though containerization offers security from pilferage, it provides a means for obscuring contraband as well as opportunities to tamper with goods in shipment. Although the Container Security Initiative (CSI) and the Customs-Trade Partnership Against Terrorism (C-PAT) are high profile initiatives seeking to improve the security of global supply chains, vulnerability still remains from the port of origin and on the high seas to the port of discharge. This research is based on interviews from a wide range of supply chain participants that includes regulatory agencies, transportation providers, importers, exporters, and trade intermediaries. These provide the basis for a decomposition of the global maritime supply chain into those elements up to that point when goods are cleared by U.S. Customs. Analysis of the informational and physical flows suggests that the greatest vulnerabilities lie in those transportation segments between the origin of the goods and that point when they await shipment at a foreign port.
      PubDate: 2020-10-15
      DOI: 10.1007/s12198-020-00224-0
       
  • An overview of operational security considerations for husbanding service
           providers of the U.S. navy
    • Abstract: The United States is continually facing threats from state and non-state actors. Operating in and around the areas where these entities have influence poses unique threats to the ability to carry out the mission of sustained forward presence. Husbanding service providers (HSP) are the primary source of logistics support for U.S. Navy ships calling to foreign ports. The nature of HSP work necessitates access to sensitive information, which can provide clues to the nature of naval operations. Properly vetting third-party and contracted logistics support providers is crucial in maintaining security of operations. The purpose of this paper is to provide a general overview of operational security implications of contracting HSPs to serve the U.S. Navy abroad.
      PubDate: 2020-10-03
      DOI: 10.1007/s12198-020-00221-3
       
  • Appraisal of a Ship’s Cybersecurity efficiency: the case of piracy
    • Abstract: New information technologies are beneficial for ship operations in terms of safety and utilisation of company resources. However, new cybercrime threats have emergedaffecting, both ship safety and security that need to be assessed and evaluated. At the moment, actions of the maritime industry to keep pace dealing with such threats are slow when compared with other business sectors. As a high concern, maritime pirates could take advantage of cybersecurity breaches to monitor ship activity and gain information for potential protective failures. In 2021 companies and seafarers should be able to demonstrate knowledge and safeguard policies of their companies. Nevertheless, there is limited discussion on how companies will educate seafarers for existing threats. Therefore, in this study, a risk-based methodology is proposed for evaluation of cybersecurity threats in the context of a piracy attack. STPA-SafeSec’s analysis is used to identify security threats, and FAHP is utilised for evaluating the severity of each security constraint. Audits on 15 ships with 315 seafarers indicated that there are significant security gaps mainly due to lack of awareness from operators and seafarers. However, physical security and network protection that already apply to ships are significant security strengths.
      PubDate: 2020-09-27
      DOI: 10.1007/s12198-020-00223-1
       
  • Paperless ship navigation: cyber security weaknesses
    • Abstract: Maritime transportation is backbone of globalized trade and the manufacturing supply chain as nowadays more than four fifths of world merchandise trade by volume is carried by ships. Safe navigation of ships of today depends heavily on cyber-physical systems, of which the central is the Electronic Chart Display and Information System (ECDIS). The paperless ship navigation is allowed when the type approved ECDIS with official electronic navigation charts acts as an independent backup for the primary system. In this paper, we present an analysis of cyber security weaknesses of the paperless ship navigation that relies on two internetworked ECDIS workstations in the backup arrangement. The method of analysis is based on cyber security testing of the ECDIS workstations with an industry vulnerability scanner tool. The detected vulnerabilities are analysed in the context of ECDIS backup arrangement and safeguards implemented on board the paperless ship. The obtained results suggest that the critical cyber threat vectors result from uncontrolled internetworking of unmaintained ECDIS workstations with identical hardware and software configurations.
      PubDate: 2020-09-25
      DOI: 10.1007/s12198-020-00222-2
       
  • REAL ID: privacy concerns still a factor, but weakly so
    • Abstract: Statewide research conducted to design a campaign to inform Montana residents about the REAL ID Act supported previous claims that some Rocky Mountain residents view the law as an invasion of privacy. Although most Montana residents (60%, n = 194) planned to get their REAL IDs within the first year that it became available, 43% (n = 141) of respondents to a survey of registered voters (n = 325) intended to wait more than one year or never obtain it. Individuals who planned to wait were more likely to report concerns about government collection of personal data, and view the law as an invasion of privacy. However, the relationship is weak. As one of several states that opposed adoption of the Real ID Act in, Montana was characterized in academic and lay media as basing its opposition on concerns about violations of privacy. State officials were so concerned that residents would object to the imposition of the new ID, that REAL ID campaign organizers were directed to only raise awareness, and avoid any efforts at persuasion. Focus groups conducted to assess responses to several campaign strategies indicated an approach that described REAL ID as consistent with traditional Montana values of independence, but did not confront privacy concerns. This paper uses quantitative and qualitative data in an attempt to understand how strong such resistance in Montana actually was.
      PubDate: 2020-09-07
      DOI: 10.1007/s12198-020-00220-4
       
  • The interconnectedness between efforts to reduce the risk related to
           accidents and attacks - naval examples
    • Abstract: Fatalities on board military vessels are the result of different types of incidents, including both accidents and antagonistic attacks. The aim of this study is to identify aspects that determine the safety and operability of military vessels from a sociotechnical perspective. Safety is studied in relation to four different types of operations: the Falklands War in 1982, antagonistic attacks in situations other than war from 2000 to 2012, submarine incidents from 2000 to 2015, and severe accidents involving military vessels in Norway and Sweden from 1990 to 2015. For the incidents analyzed, the study identifies qualitative aspects that contributed to the outcome and consequences of the incident and, if possible, the risk level. The importance of organizational and management safety issues, personnel safety issues and design safety issues are analyzed. The study shows that different operational types have different risk levels but, to some extent, the same types of safety issues. In general, risk is high when the ship is not prepared and managed for war; the recoverability, i.e., the ability to limit consequences, is an important safety factor in all of the operational types studied. The probability of an incident occurring is governed by management decisions, and the recoverability is governed by the capacity for effective crew actions despite limited management. The presence of external threats leads to a need for extra levels of system understanding, for management and for personnel.
      PubDate: 2020-08-31
      DOI: 10.1007/s12198-020-00219-x
       
  • Exploring Contemporary Sea Piracy in Nigeria, the Niger Delta and the Gulf
           of Guinea
    • Abstract: Piracy is a global crime which impedes the free movement of ships containing people and goods, with its attendant economic ramifications. The perpetrators are usually heavily armed, with sophisticated weapons to enable them to hijack a vessel or vessels and redirect them to their desired location for the payment of an expected ransom. This paper thematically explores contemporary piracy in the African state of Nigeria, the Niger Delta and the Gulf of Guinea. Nigeria is undeniably a rich country based on its economic, agricultural and population advantages, but criminal activities like piracy have been a significant disadvantage. Most of the piracy activities happening in Nigeria are mainly located in the Niger Delta region, the heart of Nigeria’s oil and gas exploration. Some of the unemployed youths of the region use piracy activities as a fightback against the so-called “resource control” embarked upon by the Federal Government of Nigeria, which disadvantages them.
      PubDate: 2020-08-31
      DOI: 10.1007/s12198-020-00218-y
       
  • AERODROM security climate: development and validation of the aerodrome
           security climate questionnaire (ADSECQ)
    • Abstract: Large numbers of passengers and large amounts of goods are transported by air every year. This attracts the interest of terrorists, which poses high demands on aerodrome security. Technological solutions, and rules and regulations, have been widely implemented to detect security threats, but there is also a need for leading security indicators. Safety culture and climate have been identified as such leading indicators. The aim of this study was to develop and test a questionnaire instrument to measure aerodrome security climate. The development contained an expert focus group, expert panel, two pilot tests at four and five airports, respectively, and one full-scale study at nine Swedish commercial airports. The final instrument comprised 12 dimensions grounded in previous safety culture and climate research, and targeting three organizational levels. It had good psychometric properties and was validated against compliant as well as participative security behavior. We believe ADSECQ is suitable to evaluate the aerodrome security climate standard, pinpoint security climate areas for improvement, and evaluate the effect of interventions.
      PubDate: 2020-08-27
      DOI: 10.1007/s12198-020-00217-z
       
  • The rising prevalence of weapons in unsafe arming configurations
           discovered in American airports
    • Abstract: Recent studies have shown that Americans appear to be increasingly owning and carrying firearms for personal protection, and are increasingly storing their firearms loaded. However, the prevalence of firearm carry and/or storage behaviors with a round chambered has not hitherto been studied in any context, including among airline passengers. We analyze firearms detected at Transportation Security Administration (TSA) airport security check-points between 2012 to 2017, to examine geospatial and temporal trends in the prevalence of unsafe arming configuration in detected firearms. The fraction of detected firearms found to be loaded has risen significantly since 2012, with 3.9% [1.2%, 6.7%] relative increase in odds per year (Beta Binomial regression, p = 0.011). States with firearm child access prevention laws have significantly fewer firearms found by the TSA to be loaded (p = 0.039). The fraction of loaded firearms found by the TSA to also have a round chambered has also risen significantly since 2012, with 5.3% [2.7%,7.9%] relative increase in odds per year (Beta Binomial regression, p < 0.001). By 2017, 36% of firearms found loaded were also found to have a round chambered. Some Americans appear to be increasingly using and storing firearms in unsafe arming configurations. This poses potential risks to airport security personnel and other travelers in airports. Understanding the geospatial patterns in these risks can help guide optimization of regional screening practices and optimal economical allocation of TSA resources.
      PubDate: 2020-08-21
      DOI: 10.1007/s12198-020-00214-2
       
  • Correction to: CH-Net: Deep adversarial autoencoders for semantic
           segmentation in X-ray images of cabin baggage screening at airports
    • Abstract: The original version of this article unfortunately contained a mistake. The author name Mostefa Merah in the author group is now presented correctly.
      PubDate: 2020-08-15
      DOI: 10.1007/s12198-020-00215-1
       
  • Estimating the costs for the airport operator and airlines of a
           
    • Abstract: Commercially-acquired drones threaten airport operations due to limited knowledge of airspace safety regulations or deliberate action by drone operators. This study aims to determine whether the investment cost of a drone-defence system can be justified in relation to the financial cost of a drone-related shutdown. To that end, a case study of Frankfurt Airport is carried out with simulations of different disruptions during a peak-activity period similar to the 2018 Gatwick drone incident. With data on passenger traffic and airline schedules, we developed a passenger recovery algorithm to determine the amount of delays caused by the disruptions and the costs for the airport operator and the airlines. Results show that the investment in a drone-defence system is offset by the costs of a 48-h continued closure or several smaller closures, but since the largest share of costs is borne by the airlines, investments should be shared between both stakeholders.
      PubDate: 2020-07-08
      DOI: 10.1007/s12198-020-00212-4
       
  • Security of passenger transport in the Baltic Sea in the context of
           foreign terrorist fighters
    • Abstract: The Baltic Sea basin is one of the busiest areas in Europe in terms of the passenger transport and is considered as a domestic sea of the European Union, very important for the development and prosperity of all citizens. A high number of ferries connections along with exclusive cruise ships, visiting the Baltic countries, make the sea very busy. At the same time the security of lines of communications has become the highest priority, especially that a possibility of terrorist attacks still poses a serious threat. Although terrorism has been being fought intensively since 11th September, terrorist organizations such as Al-Qaeda or Islamic State of Iraq and the Levant, are still able to attack. The article considers the threat of organizing a terrorist attack posed by Foreign Terrorist Fighters returning home to the Baltic countries. Due to the fairly high number of Foreign Terrorist Fighters in some countries around the Baltic Sea, very intense passenger traffic in the area, and the appeals which have been proclaimed by Al-Qaeda and Islamic State leaders, there is a possibility of a terrorist attack occurrence in the near future. Cited facts lead to the conclusion that some precautions should be taken both in terms of technical and organizational measures to make passenger traffic secure.
      PubDate: 2020-07-08
      DOI: 10.1007/s12198-020-00213-3
       
  • Improving CAN bus security by assigning dynamic arbitration IDs
    • Abstract: The controller area network (CAN) is one of the most popular intra-vehicular communication protocols in the automotive industry. Due to its simplicity and broadcasting technique, the CAN bus protocols have some vulnerabilities. In the last couple of years, security attacks on vehicles have been increasing significantly. These acute attacks remain undetected by the conventional CAN protocol. In this paper, we propose a method that can prevent many kinds of CAN bus monitoring attacks without any change in the underlying CAN protocol. The experimental results demonstrate that our proposed methodology is useful for preventing as well as defending against attacks on the CAN bus. In the worst-case scenario, the proposed algorithm requires 0.41 s to detect an attack and prevent the attack by dynamically updating the message arbitration ID of a system comprising twelve types of message IDs.
      PubDate: 2020-04-28
      DOI: 10.1007/s12198-020-00208-0
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.235.25.169
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-