1.
Bichnigauri A, Shonia L, Shonia I. Bypassing F5 WAF for Data Exfiltration during Post-Exploitation. mcaaict [Internet]. 2025 Dec. 30 [cited 2026 Feb. 6];(4):89-93. Available from: https://papers.4science.ge/index.php/mcaaict/article/view/372