Modelling the response to terrorist port intrusion | IEEE Conference Publication | IEEE Xplore