IIC Journal of Innovation 2nd Edition | Page 18

Toward a Safe and Secure Medical Internet of Things  K. K. Venkatasubramanian et al. "Security and Interoperable-Medical- Device Systems, Part 1," IEEE Security Privacy, vol. 10, no. 5, pp. 61-63, Sept./Oct. 2012.  Eugene Y. Vasserman , Krishna K. Venkatasubramanian , Oleg Sokolsky , Insup Lee, Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification, IEEE Security and Privacy, v.10 n.6, p.70-73, November 2012.  Content of Premarket Submissions for Management of Cybersecurity in Medical Devices, Guidance for Industry & FDA Staff, October 2014  Postmarket Management of Cybersecurity in Medical Devices, Draft Guidance for Industry and FDA Staff, January 2016  RTI Customers: https://www.rti.com/industries/index.html  ROS on DDS http://design.ros2.org/articles/ros_on_dds.html  RTI Customer Snapshot: EMS Device Integration Platform for World’s largest EMS equipment Provider. https://www.rti.com/industries/#HEALTH  RTI Customer Snapshot: Minimally Invasive Robotic Surgery. http://www.rti.com/docs/German_Aerospace_Center_DLR.pdf  RTI Customer Snapshot: Exelis C4i Command and Control Systems. https://www.rti.com/industries/#HEALTH  RTI Press release: GE Healthcare. https://www.rti.com/company/news/ge-healthcare.html  RTI Customer Snapshot: Medical Imaging. https://www.rti.com/industries/#HEALTH  RTI Customer Snapshot: Advanced Proton Therapy. https://www.rti.com/industries/#HEALTH  James, John T. PhD. A New, Evidence-based Estimate of Patient Harms Associated with Hospital Care. Journal of Patient Safety, September 2013. http://journals.lww.com/journalpatientsafety/Fulltext/2013/09000/A_New,_Evidence_bas ed_Estimate_of_Patient_Harms.2.aspx  Healthcare Technology. “Deaths by medical mistakes hit records” http://www.healthcareitnews.com/news/deaths-by-medical-mistakes-hit-records  RTI IIoT Transportation Applications:. https://www.rti.com/industries/#TRANSPORT  RTI IIoT Energy Applications: https://www.rti.com/industries/#ENERGY  RTI IIoT Defense Applications: https://www.rti.com/industries/#DEFENSE  Defense in Depth: A practical strategy for achieving Information Assurance in today’s highly networked environments” https://www.nsa.gov/ia/_files/support/defenseindepth.pdf  SmartAmerica Closed-Loop Healthcare Group: http://www.mdpnp.org/smartamerica.php  OpenICE Infusion Safety App Architecture: https://www.openice.info/docs/3_apps.html infusion-safety  Mullen, A. B. (2013, 09). Premature enforcement of CDRH’s draft cybersecurity guidance. http://www.fdalawblog.net/fda_law_blog_hyman_phelps/2013/09/prematureenforcement-of-cdrhs-draft-cybersecurity-guidance.html  M. Rushanan, D. F. Kune, C. M. Swanson, and A. D. Rubin, "SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks", IEEE Symposium on Security and Privacy, 2014 IIC Journal of Innovation - 17 -