Anomalous access point detection
Abstract:
Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
Public/Granted literature
Information query
Patent Agency Ranking
0/0