Skip to main content

Currently Skimming:

Pages 9-11

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.

From page 9...
... 8 Chapter 2 Literature Review For the literature review, the research team sought out recent resources and guidance to compile information in preparation for the revision of Security 101 that would effectively capture and present the scope of physical and cyber security issues impacting today's transportation agencies. In particular, the team focused on: • Updating the Annotated Bibliography contained in Appendix A in the first edition of Security 101.
From page 10...
... 9 Transportation specific sources included the published research reports from the NCHRP and TCRP programs; FHWA, FTA, Volpe National Transportation Systems Center and other federal agencies; ITS America, AASHTO, APTA and other transportation related organizations. The team also searched specific databases and sources such as the National Laboratory research (e.g.
From page 11...
... 10 • There are a number of transportation asset assessment methodologies that incorporate a variety of risk models such as likelihood models, consequence models, delay/detour models and recovery consequence models. • There are, however, a very limited number of tools available to assess resilience of transportation systems.

Key Terms

This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.