Unresolvable Identifier
critical
doi_compliance
unresolvable_identifier
Identifier '10.1016/j.ijcip.2022.100505' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.
Paper page Integrity report arXiv Try DOI
Evidence text
A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, "A cyber incident response and recovery framework to support operators of industrial control systems," International Journal of Critical Infrastructure Protection, vol. 37, Art. no. 100505, 2022, doi: 10.1016/j.ijcip.2022.100505. [25]J.Huang, J.Xu, X.Xing, P.Liu, andM.K.Qureshi, "FlashGuard: Leveragingintrinsicflash properties to defend against encryption ransomware," inProc. ACM SIGSAC Conference on Com- puter and Communications Security (CCS), 2017, pp. 2231–2244, doi: 10.1145/3133956.3134035
Evidence payload
{
"arxiv_id": null,
"checked_sources": [
"crossref_by_doi",
"openalex_by_doi",
"doi_org_head"
],
"doi": "10.1016/j.ijcip.2022.100505",
"raw_excerpt": "A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, \"A cyber incident response and recovery framework to support operators of industrial control systems,\" International Journal of Critical Infrastructure Protection, vol. 37, Art. no. 100505, 2022, doi: 10.1016/j.ijcip.2022.100505. [25]J.Huang, J.Xu, X.Xing, P.Liu, andM.K.Qureshi, \"FlashGuard: Leveragingintrinsicflash ",
"ref_index": 36,
"verdict_class": "cross_source"
}