{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.24184","arxiv_id":"2604.24184","integrity":{"available":true,"endpoint":"/pith/2604.24184/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:36:28.132955Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:23:19.313734Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.34190/iws.121.079' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.34190/iws.121.079","detected_arxiv_id":null,"ref_index":33,"audited_at":"2026-05-19T22:23:19.313734Z"}],"snapshot_sha256":"5f81d4f308d960b6f1d730549262579685e2a3b3f44ada5c9c82233a0222c178"},"events":[{"event_id":3357,"event_type":"pith.integrity.v1","payload_sha256":"327b6767289f8efb607c8d79490ac64c4ef275a15528ce2f96c5e7eff3fd46e3","signature_b64":"yvCUG4xvgmNAAuf9sMR4KJYv8dXyAvSD73R0xyhg4+luDyzsTAuRn/hVBlMmEnNoR431LDr2539zoZsmEf9MBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:27:24.913686+00:00","payload":{"note":"Identifier '10.34190/iws.121.079' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Jeffrey A. Nichols, Kevin Spakes, Cory Watson, and Robert A. Bridges. Assembling a cyber range to evaluate AI/ML security tools.arXiv preprint arXiv:2201.08473, 2022. doi: 10.34190/iws.121.079","arxiv_id":"2604.24184","detector":"doi_compliance","evidence":{"doi":"10.34190/iws.121.079","arxiv_id":null,"ref_index":33,"raw_excerpt":"Jeffrey A. Nichols, Kevin Spakes, Cory Watson, and Robert A. Bridges. Assembling a cyber range to evaluate AI/ML security tools.arXiv preprint arXiv:2201.08473, 2022. doi: 10.34190/iws.121.079","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":33,"audited_at":"2026-05-19T22:23:19.313734Z","event_type":"pith.integrity.v1","detected_doi":"10.34190/iws.121.079","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"9c609baed618a429544e54cdc46fee077205878b1aaca2cfba9c2c24b7583d50","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.24184/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}