{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.23905","arxiv_id":"2604.23905","integrity":{"available":true,"endpoint":"/pith/2604.23905/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:42:17.679531Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:36:27.438234Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.3390/sys-tems12070238) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.3390/sys-tems12070238","detected_arxiv_id":null,"ref_index":12,"audited_at":"2026-05-19T22:36:27.438234Z"}],"snapshot_sha256":"c2d4bb3dde22050313dc90efcac1c7ec19b675e282ebb361dd3cc4acfc474ec0"},"events":[{"event_id":3474,"event_type":"pith.integrity.v1","payload_sha256":"f0c9d2f21ed45f1d3207298b3f7ceeee26e07c1c2a8f802086527ed3c0deb5fa","signature_b64":"BTqxVCusTwDISJKnvejaR9Pux0wpXVO6PQDxu8rsVPQqCmsLQUsnbc9R3Ae12sirk+NNXy+1NEpHJMUtAJtrDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:37:25.432593+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.3390/sys-tems12070238) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"S. Fowler, K. Joiner, and S. Ma, “Cyber Evaluation and Management Toolkit (CEMT): Face validity of model-based cybersecurity deci- sion making,”Systems, vol. 12, no. 7, Jun. 2024, doi: 10.3390/sys- tems12070238","arxiv_id":"2604.23905","detector":"doi_compliance","evidence":{"ref_index":12,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"S. Fowler, K. Joiner, and S. Ma, “Cyber Evaluation and Management Toolkit (CEMT): Face validity of model-based cybersecurity deci- sion making,”Systems, vol. 12, no. 7, Jun. 2024, doi: 10.3390/sys- tems12070238","reconstructed_doi":"10.3390/sys-tems12070238"},"severity":"advisory","ref_index":12,"audited_at":"2026-05-19T22:36:27.438234Z","event_type":"pith.integrity.v1","detected_doi":"10.3390/sys-tems12070238","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"2070cb159ca10a49422cbd207780219f270429c09f6beb6b22a6b183357224f3","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.23905/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}