{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.23725","arxiv_id":"2604.23725","integrity":{"available":true,"endpoint":"/pith/2604.23725/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:52:35.399008Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/s0378-8733(00)00016-0' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/s0378-8733(00)00016-0","detected_arxiv_id":null,"ref_index":13,"audited_at":"2026-05-19T22:52:35.399008Z"}],"snapshot_sha256":"841f2528a55bdab2d43e2f1132be8ae747cddfedc5438df12cb1b71c2abba9b9"},"events":[{"event_id":3523,"event_type":"pith.integrity.v1","payload_sha256":"f2d94f4312260cce7c527e7efb21a946e0efbe91080e7007c70aef4968acc896","signature_b64":"rKjB023Ieblf+PvIAqBvitGDioxyw4TYYriycKojxx8KZlU+oEoIZxnh+EVHnGi15WXABZEOfBW2QOXFGbrlAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:57:26.239219+00:00","payload":{"note":"Identifier '10.1016/s0378-8733(00)00016-0' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"B. Ruhnau, Eigenvector -centrality a node -centrality Social Networks 22(4), 357–365 (2000). https://doi.org/10.1016/S0378-8733(00)00016-0","arxiv_id":"2604.23725","detector":"doi_compliance","evidence":{"doi":"10.1016/s0378-8733(00)00016-0","arxiv_id":null,"ref_index":13,"raw_excerpt":"B. Ruhnau, Eigenvector -centrality a node -centrality Social Networks 22(4), 357–365 (2000). https://doi.org/10.1016/S0378-8733(00)00016-0","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":13,"audited_at":"2026-05-19T22:52:35.399008Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0378-8733(00)00016-0","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"96cf1aa2f9e4244568c75f3f8ae9831942b2ea2bd7831e04106d3ea2835324bc","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.23725/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}