Author of the publication

Manufacturers' integrated strategies for emission reduction and recycling: The role of government regulations.

, , , and . Comput. Ind. Eng., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction., , , and . FSKD (4), page 307-311. IEEE Computer Society, (2007)0-7695-2874-0.Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack., , , and . Comput. J., 58 (4): 973-985 (2015)Methodology of Network Intrusion Detection System Penetration Testing., and . WAIM, page 546-551. IEEE, (2008)Weibo: An Information-Driven Online Social Network., , , and . Trans. Computational Science, (2014)Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function., , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 553-562. Springer, (2006)Proposion and Analysis of a TCP Feature of P2P Traffic., , and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 1148-1155. Springer, (2007)Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid., , , , , , , , , and 4 other author(s). SC, page 325. ACM Press, (2006)Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic., , , , , and . JNW, 5 (5): 577-585 (2010)A Wav-Audio Steganography Algorithm Based on Amplitude Modifying., and . CIS, page 489-493. IEEE Computer Society, (2014)Analysis And Classification of IPSec Security Policy Conflicts., , and . FCST, page 83-88. IEEE Computer Society, (2006)