1.
Bichnigauri A, Shonia L, Shonia I. Bypassing F5 WAF for Data Exfiltration during Post-Exploitation. mcaaict. 2025;(4):89-93. Accessed February 6, 2026. https://papers.4science.ge/index.php/mcaaict/article/view/372