Journal of Transportation Security
2016 - 2026
Current editor(s): Andrew Thomas From Springer Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 19, issue 1, 2026
- Taxonomy of threats, security mechanisms, and regulatory frameworks for cargo delivery drones pp. 1-45

- Kumar Sekhar Roy, Manish Kumar, Shweta Singh, Subhrajyoti Deb, Rohit Kumar Das and Sk Mahmudul Hassan
- Leveraging 2D object detection models for accurate biomatter threat identification in 3D CT scans of baggage pp. 1-23

- Ivan Koptev, Cameron Walker and Andreas W. Kempa-Liehr
- Multinational responses to Somali piracy: the emergence and contribution of combined task force 151 (2009–2023) pp. 1-25

- Barış Şahi̇ner
- Efficiency versus security in the transportation security agency (TSA’s) public-private partnership program (PPP) pp. 1-10

- Michael Turtz and Andrea Ramos
- Addressing maritime biosecurity challenges via ballast water treatment technologies and regulations pp. 1-18

- Maria Burns and Stephen Merryman
- Managing unruly passengers in commercial aviation: cabin crew perspectives on escalation, intervention, and flight safety pp. 1-18

- Özgür Sert, İbrahim Sani Mert and Serdar Kızılcan
- Aviation laser strikes in Canada, 2022–2024: temporal trends, risk factors, and security implications pp. 1-18

- Jules Yimga
- Vulnerability assessment of vehicle access system using software-defined radio (SDR): attacks, testing, comparative analysis and future countermeasures pp. 1-12

- Iram Shaikh, Vedant Sakinal, Vedashree Bhongale, Sheetal Borde, Rupali Kamathe and Vandana Hanchate
- Design of the Fuzuli international airport security system based on the application of drone technology pp. 1-21

- Ruslan Rustamov
- Do cybersecurity insurance applications in the UAE align with international and national security standards? pp. 1-31

- Moatsum Alawida, Iman Akour, Mohammad Alauthmn, Abid Mehmood and Nour Mohamed
- Maritime chokepoint insecurity and systemic trade vulnerability: A transportation security assessment of the Strait of Hormuz pp. 1-14

- Rokaya Lassoued
- The impact of Bab al-Mandab and the strait of Hormuz on Somalia’s ports and maritime security pp. 1-26

- Mohamed Gabow Kassim and Abdullahi Ilyas Osman
- Emerging threats in aviation: a study of recent cyber and hybrid attacks on global airports pp. 1-17

- Navtika Singh Nautiyal and Amirjon Mardonov
- Rapid trace explosive screening using high-speed GC coupled with tandem DMS for aviation security applications pp. 1-9

- Saida Ahmadova and Ramil Mukhtarov
- A new framework for identifying aviation threat actors: behavioral awareness and operational role-based classification pp. 1-9

- Shola Shekili
- Securing critical maritime and Navy infrastructures: A workforce analysis of the Navy Security Forces pp. 1-34

- Lauren Ceh, Katherine Herrmann, Stephan Munari, Ryan Sullivan and Simon Véronneau
- Simulation of DoS and jamming attacks on railway control systems over TCP/IP and radio frequency pp. 1-24

- Mays Abukeshek, Mohammed Al-Mhiqani, Simon Parkinson and Remy Odimegwu
- A bibliometric mapping of risks in maritime transportation: milestones, current research trends, and future research opportunities pp. 1-24

- İlknur Gizem Yazar Okur and Rasim İlker Gökbulut
- All eyes on Hormuz: nuclear escalation, geopolitical signaling, and global maritime vulnerability pp. 1-3

- Abshir Abdisheekh Mohamed and Abdinor Abukar Ahmed
- Finding the next Navy SEALs: using big data to predict training success pp. 1-19

- Sawyer J. Rogers, Ryan S. Sullivan, Simon Véronneau and William C. Weldin
- The Phantom shipment threat: strengthening transportation security against freight fraud in global supply chains pp. 1-19

- Shreyansh Srinivasan
- Enhancing maritime port facility security exercises “tabletop” through integrated virtual reality game-based simulator and artificial intelligence: ISPS code implementation pp. 1-19

- Ahmed Mohy Ibrahim
Volume 18, issue 1, 2025
- Managing risk and reputation: What TSA complaint trends reveal about transportation security challenges in 2023–2024 pp. 1-20

- Jules Yimga
- Smart airports and the evolving cyber threat pp. 1-20

- Ash Rossiter
- Analysis of the reasons and legal countermeasures of disruptive behaviors on Chinese civil aircraft—From the perspective of legislation improvement pp. 1-11

- Yi fan Chen
- Radical calm in aviation security: profiling controlled dissociation and behavioral ambiguity at checkpoints pp. 1-11

- Shola Shekili
- Cyber threats to maritime SAR operations in the arctic: risks from public data pp. 1-23

- Hristos Karahalios
- Navigating the future: the expanding role of unmanned surface vehicles in maritime security pp. 1-23

- Alberto Boretti
- Comparative analysis of digital technologies and legal frameworks in customs operations: A focus on violation detection pp. 1-23

- Saltanat Mamyrova, Gulnar Alibayeva, Kultay Adilova, Ainur Kussainova and Serikkali Tynybekov
- Transnational wildlife trafficking via airways: a criminological study of Trends, modus operandi, and enforcement challenges at Chennai International Airport pp. 1-23

- R. M. Arivazhagan, T. Jayakumar and M. Venkataraman
- Video-based analysis for evacuation behavior in a train: case study of a stabbing incident pp. 1-23

- Munendo Fujimichi, Takayuki Masuda and Fumitoshi Kikuchi
- Strategies to combat terrorism: proactive intelligence measures for assessing risks and preventing terrorism prior to transportation embarkation points pp. 1-22

- Maria Burns and John Wulu
- Smart contract-based shipment for beverage supply chain 4.0 pp. 1-22

- Praveen Vijaya Raj Pushpa Raj and Vadivel S. M
- What makes a port safe? A multi-criteria analysis from captains’ standpoint using BBWM and MARCOS pp. 1-28

- Mehmet Gurturk and Erkan Celik
- The method for ıncreasıng securıty by ıntegratıng unmanned aerıal vehıcles (uav) ınto perımeter securıty systems pp. 1-10

- Famin Salmanov, Ramil Mukhtarov, Namig Heydarov, Haji Vahid Akhundzada and Nazira Mazanova
- AI-driven manipulative technologies and the evolution of transport threats: a risk-based assessment pp. 1-10

- Shola Shekili
- An analysis of X-ray screening performance of newly recruited security officer: an exploratory study on undetected threats by demographic and work environments pp. 1-25

- Dong-min Kim and Yong-seok Jang
- Maritime trespass and sovereignty: A doctrinal and comparative legal analysis of international norms and state practice pp. 1-25

- Mahmudul Hasan Asm and Md Syful Islam
- Turbulent waters in the red sea: understanding maritime shipping business impacts and implications pp. 1-31

- Alka Rai
- Transportation infrastructure and security implications in Alaska’s North: the case of the expanded port in Nome pp. 1-21

- Brandon M. Boylan and Jeremy S. Speight
- The Abuja-Kaduna expressway, a transportation corridor under insecurity pp. 1-21

- Nneamaka Ijie Obodo and Emmanuella Onota
- Air passenger data transfer regulations in indonesia: balancing privacy and security pp. 1-18

- Safathira Zaldin and Dinar Dewi Kania
- Automatic dependent surveillance: attacks, challenges and countermeasures pp. 1-13

- Andrew Morrow and Varghese Mathew Vaidyan
- Impact of cyber threat awareness on driver response to an unexpected vehicle cyberattack pp. 1-26

- Trevor F. Lanigan, Tyler Biggs, Erika E. Gallegos, Jeremy Daily, Emma J. Reid and Sarah Powers
- Cybersecurity threats of remote autonomous ships while approaching ports pp. 1-14

- Hristos Karahalios
- Autonomous ships and flag state: challenges and opportunities in international maritime law pp. 1-17

- Ruth García-Llave, Fabio Héctor Echeverry Andrade and Daniel José Coronil Huertas
- A Bayesian network analysis of aviation terrorism attack risks pp. 1-17

- Yessika Adelwin Natalia, Harald De Cauwer, Thomas Neyens, Krzysztof Goniewicz, Francis Somville and Geert Molenberghs
- Correction: Transportation infrastructure and security implications in Alaska’s North: the case of the expanded port in Nome pp. 1-1

- Brandon M. Boylan and Jeremy S. Speight
- Transportation security at hubs: addressing key challenges across modes of transport pp. 1-16

- Morton E. O’Kelly
- Smart ports in the 5G era: US–China technological competition, governance challenges, and Taiwan’s strategic responsejia pp. 1-16

- Jia-Ying Lyu
- Turbulence beyond the skies: an integrated analysis of crisis propagation in the global aviation industry pp. 1-16

- Pulkit Priyadarshi, Anulaya Khare, Shiva Upman and Pratap Chandra Mandal
- Cybersecurity failures and air travel disruptions: estimating the impact of the CrowdStrike IT outage on Atlanta International Airport pp. 1-34

- Jules Yimga
- Predicting geopolitical instability through GNSS anomalies and air traffic data pp. 1-19

- Eugene Pik, João S. D. Garcia, Timothy A. Smith, Ibrahim Kocaman and Matthew Berra
- How secure is CPDLC? a comprehensive review of cyber threats and defense mechanisms in aviation communication pp. 1-37

- Dima Alhalabi, Moatsum Alawida and Rasha Hasan
| |