Article Title,Year,Volume,Issue,Page Range,Author Piracy in the Horn of Africa and its effects on the global supply chain,2010,3,4,231-243,Sullivan On analysing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective,2010,3,4,213-230,Ekwall Container transportation as an interdependent security problem,2010,3,4,197-211,Psaraftis Risk and economic assessment of expedited passenger screening and TSA PreCheck,2017,10,1-2,1-22,Stewart When should TSA PreCheck be offered at no cost to travelers?,2017,10,1-2,23-29,Jacobson The "car-bomb" as a terrorist tool at metro stations railway terminals and airports,2017,10,1-2,31-43,Shvetsov Using sensor network for passengers prescreening in air transport,2016,9,3-4,117-124,Kraus Socioeconomic development and the risk of maritime piracy,2016,9,3-4,125-160,Okeahalam Road safety challenges in Pakistan: an overview,2016,9,3-4,161-174,Nazir Conceptualizing maritime security for energy transportation security,2016,9,3-4,175-190,Kosai Flying challenges for the future: Aviation preparedness - in the face of cyber-terrorism,2016,9,3-4,191-218,Fox An optimal sonar placement approach for detecting underwater threats under budget limitations,2016,9,1-2,17-34,Biobaku Do we feel safer today? The impact of smiling customer service on airline safety perception post 9-11,2016,9,1-2,35-56,Hunter Cargo theft in the motor carrier industry: an exploratory study,2016,9,1-2,57-70,Boone Sri Lanka is a hot spot for illegal transnational trading of biodiversity and wildlife materials from South Asian region,2016,9,1-2,71-85,Azam Optimal routing of infiltration operations,2016,9,1-2,87-104,Batta Perceptions of security in public transport systems of Germany: prospects for future research,2016,9,1-2,105-116,Masoumi The use of violence in cargo theft - a supply chain disruption case,2018,11,1,3-21,Ekwall Can software defined radio be used to compromise ADS-B aircraft transponder signals?,2018,11,1,41-52,Revels Urban rail patrolling: a game theoretic approach,2018,11,1,23-40,Yolmeh Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks,2018,11,3,117-136,Stewart Evacuation time at Jong-no 3ga subway station considering electric train delays and congestion,2018,11,3,137-150,Lee Major incidents that shaped aviation security,2019,12,1,39-56,Klenka At-risk populations to unintentional and intentional fentanyl and fentanyl+ exposure,2019,12,3,73-82,Schwartz Civil unmanned aircraft systems and security: the European approach,2019,12,3,83-101,Huttunen Modeling traveler recovery time following man-made incidents: the case of the Athens metro,2019,12,3,103-117,Prodromitis Linking aviation security failures to human-mediated error. A review of the related literatures with directions for policy and research,2020,13,1,33-51,McFarlane Maritime trade and piracy in the Gulf of Aden and the Indian Ocean (1994-2017),2020,13,3,141-158,Hamza Exploring contemporary sea piracy in Nigeria the Niger Delta and the Gulf of Guinea,2020,13,3,159-178,Nwalozie Security of passenger transport in the Baltic Sea in the context of foreign terrorist fighters,2020,13,3,215-229,Wardin The interconnectedness between efforts to reduce the risk related to accidents and attacks - naval examples,2020,13,3,245-272,Liwång The rising prevalence of weapons in unsafe arming configurations discovered in American airports,2021,14,1,1-18,Thakur AERODROM security climate: development and validation of the aerodrome security climate questionnaire (ADSECQ),2021,14,1,19-39,Torner Ensuring safety and security in employing drones at airports,2021,14,1,41-53,Shvetsova Developing critical thinking skills among Transportation Security officers (TSOs) through sharing tacit knowledge,2021,14,1,107-118,Lee Cyber resilience of autonomous mobility systems: cyber-attacks and resilience-enhancing strategies,2021,14,3,137-155,Zou Aviation cyber security: legal aspects of cyber threats,2021,14,3,177-195,Klenka Risk analysis for forecasting cyberattacks against connected and autonomous vehicles,2021,14,3,227-247,Elvik Optimising multi-layered security screening,2021,14,3,249-273,Anderson Increasing the deterrence of airport security checks by managing expectations through communication: a hypothetical scenario experiment,2021,14,3,275-289,Hofer The right of the overflown state to divert or intercept civil aircraft under a bomb threat: an analysis with regard to Ryanair flight 4978,2021,14,3,291-306,Huttunen Global maritime piracy: impact on seafaring and the factors shaping confrontational outcomes,2021,14,3,307-324,Lewis An evaluation into the causes of perpetual disruptive passenger behavior,2022,15,1,1-22,Bell Attacks on road-freight transporters: a threat to trade participation for landlocked countries in Southern Africa,2022,15,1,23-40,Mlepo Assessment of travelers' fear of crime in intercity bus terminals: the case of Karandish terminal of Shiraz,2022,15,1,69-85,Soltani Understanding realistic attacks on airborne collision avoidance systems,2022,15,1,87-118,Smith Technologies for primary screening in aviation security,2022,15,3,141-159,Cordova Percepction of piracy and armed robbery in Bahía del Callao - Perú,2022,15,3,161-172,Razuri-Esteves Risk assessment of fuel energy transportation in Kuwait,2022,15,3,223-243,Alkheder Factors influencing cargo robbery in last-mile delivery of e-commerce: an empirical study in Brazil,2023,16,1,e10,Silva A systematic review of passenger profiling in airport security system: taking a potential case study of CAPPS II,2023,16,1,e8,Satish Laser exposure incidents and aviation safety in the United States: should we be concerned?,2023,16,1,e6,Yimga Automated detection of inorganic powders in X-ray images of airport luggage,2023,16,1,e3,Anderson Real ID campaign raises questions about privacy concerns,2023,16,1,e1,Keller Statistical analysis of maritime piracy cases in world territorial waters,2022,15,3,263-280,Akan