1
Tommy Stiansen, Samuel M Glines, Sheldon H Foss Jr: Systems and methods for dynamic protection from electronic attacks. Norse Corporation, Lewis Rice & Fingersh L C, May 13, 2014: US08726379 (125 worldwide citation)

Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.


2
Tommy Stiansen, Samuel M Glines, Sheldon H Foss Jr: Systems and methods for dynamic protection from electronic attacks. NORSE CORPORATION, Wilson Sonsini Goodrich & Rosati, October 13, 2015: US09160764 (15 worldwide citation)

Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.


3
Tommy Stiansen, Alfred Perlstein, Sheldon Foss Jr: Network appliance for dynamic protection from risky network activities. NORSE NETWORKS, Wilson Sonsini Goodrich & Rosati, April 10, 2018: US09942250 (1 worldwide citation)

Electronic appliances, computer-implemented systems, non-transitory media, and methods are provided to identify risky network activities using intelligent algorithms. The appliances, systems, media, and methods enable rapid detection of risky activities.


4
Tommy Stiansen, Samuel M Glines, Sheldon H Foss Jr: Systems and methods for dynamic protection from electronic attacks. NORSE NETWORKS, Wilson Sonsini Goodrich & Rosati, January 24, 2017: US09553888 (1 worldwide citation)

Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.


5

6

7
Tommy Stiansen: Systems and platforms for intelligently monitoring risky network activities. NORSE NETWORKS, Wilson Sonsini Goodrich & Rosati, March 20, 2018: US09923914

Technology for improving and monitoring data communication security is presented herein. The technology monitors a plurality of sources of risky activities, crawls on computer networks to scan the risky activities, visualizes the risky activities, and detects and prevents risky activities.