2010 b5 spam source detection at home
2012 the botnet traffic forensics system
2013 the current methodologies for apt malware traffic detection
Some things before network attack
Malware classification and traceability
Some things about LAN device detection