(1)
Bichnigauri, A.; Shonia, L.; Shonia, I. Bypassing F5 WAF for Data Exfiltration During Post-Exploitation. mcaaict 2025, No. 4, 89-93.