[1]
A. Bichnigauri, L. Shonia, and I. Shonia, “Bypassing F5 WAF for Data Exfiltration during Post-Exploitation”, mcaaict, no. 4, pp. 89–93, Dec. 2025, Accessed: Feb. 06, 2026. [Online]. Available: https://papers.4science.ge/index.php/mcaaict/article/view/372