2018
DOI: 10.1016/j.jairtraman.2017.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the effectiveness of an airport passenger and baggage security screening system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(10 citation statements)
references
References 44 publications
0
9
0
1
Order By: Relevance
“…• Modeling checkpoint operations and supporting infrastructure is well-identified within the R&D realm, in particular, multi-state screening such as adaptive queuing models [45], [64], [65], [66], [67], [68], causal reasoning models [66], [69], [70], [71], human-machine interaction models [72], concealed item detection models [36], baggage screening models [71], passenger flow models [73], risk scoring models [70], attack models [44];…”
Section: Contemporary Checkpointmentioning
confidence: 99%
“…• Modeling checkpoint operations and supporting infrastructure is well-identified within the R&D realm, in particular, multi-state screening such as adaptive queuing models [45], [64], [65], [66], [67], [68], causal reasoning models [66], [69], [70], [71], human-machine interaction models [72], concealed item detection models [36], baggage screening models [71], passenger flow models [73], risk scoring models [70], attack models [44];…”
Section: Contemporary Checkpointmentioning
confidence: 99%
“…In the practice of security measures, the above represent just a general framework which is complemented by a number of rules, e.g. regarding liquids checks introduced after the failed attacks in 2006 in London involving liquid explosives, or checks of electronic devices, which make the system much more effective and efficient (Skorupski and Uchroński, 2018).…”
Section: The Convention For the Suppression Of Unlawful Acts Against The Safety Of Civil Aviation (Montreal Convention) Which Was Signed mentioning
confidence: 99%
“…In [39], the design goal is to minimize risks that "all the holes of a "Swiss Cheese" model do not line up". Some efforts to improve the performance of layered security have been reported with respect to: 1) topology of the waiting queuing lines [53] and checkpoint flow models [52]; 2) optimization of the passenger flows [64], [89]; 3) development of security measures [16], [78], including measures of the cost of travel time variability [24]; 4) cost-efficient minimization of security layers [77]; 5) modeling and simulation using a multi-state model of service [59], analytic hierarchy model [92] and hybrid models; for example, combining analytic hierarchy model and others, such as Dempster-Shafer [6], and Bayesian [58]; 6) traveler authentication and risk assessment, in particular, using multi-metric causal models [50], [91]; and cognitive agent models [45].…”
Section: Accepted Manuscriptmentioning
confidence: 99%