

Publisher: John Wiley & Sons Inc
E-ISSN: 1539-6924|35|9|1663-1673
ISSN: 0272-4332
Source: RISK ANALYSIS, Vol.35, Iss.9, 2015-09, pp. : 1663-1673
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Optimal Strategies for Interception, Detection, and Eradication in Plant Biosecurity
RISK ANALYSIS, Vol. 272-4332, Iss. 9, 2015-09 ,pp. :





