{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.25696","arxiv_id":"2604.25696","integrity":{"available":true,"endpoint":"/pith/2604.25696/integrity.json","summary":{"critical":2,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":2,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T04:35:24.331124Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:52:07.647334Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"broken_identifier","severity":"critical","verdict_class":"incontrovertible","note":"DOI '10.1007/978-3-662-04821-' as printed in the bibliography is syntactically invalid and cannot resolve.","detected_doi":"10.1007/978-3-662-04821-","detected_arxiv_id":null,"ref_index":2,"audited_at":"2026-05-19T20:52:07.647334Z"},{"detector":"doi_compliance","finding_type":"broken_identifier","severity":"critical","verdict_class":"incontrovertible","note":"DOI '10.1007/978-3-540-74011-' as printed in the bibliography is syntactically invalid and cannot resolve.","detected_doi":"10.1007/978-3-540-74011-","detected_arxiv_id":null,"ref_index":21,"audited_at":"2026-05-19T20:52:07.647334Z"}],"snapshot_sha256":"27779c53bfc8f40ff8cc59520199654c6ed0e71b1cd591ebcf7fbcd20f75badf"},"events":[{"event_id":3004,"event_type":"pith.integrity.v1","payload_sha256":"6233a89f2884c9015a4c889d48e2535233e2e2a61791f03a9787de12e4953a26","signature_b64":"RHR8agKNQ85pmawSJkcCxLNE/EJ57P04PIbxuq7+1t7NjsJHuKgCSwL2QGI+7ARc93edj8cuwUymSJ8jTLodBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:52:22.088233+00:00","payload":{"note":"DOI '10.1007/978-3-540-74011-' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Ravindran, G., Szajowski, K.: (1992). Non-zero sum game with priority as Dynkin’s game.Math. Japon.37(3), 401–413. Zbl 0763.90095 Cited on p. 11. [19]Ширяев, А.Н.: (1969).Статистический последовательный анализ. Оптимальные правила остановки","arxiv_id":"2604.25696","detector":"doi_compliance","evidence":{"ref_index":21,"raw_excerpt":"Ravindran, G., Szajowski, K.: (1992). Non-zero sum game with priority as Dynkin’s game.Math. Japon.37(3), 401–413. Zbl 0763.90095 Cited on p. 11. [19]Ширяев, А.Н.: (1969).Статистический последовательный анализ. Оптимальные правила остановки.Optimisatsiya i Issledovanie Operatsi˘ı. Академиздатцентр “Наука”,Москва. doi: 10.1007/978-3-540-74011-","verdict_class":"incontrovertible","doi_as_printed":"10.1007/978-3-540-74011-"},"severity":"critical","ref_index":21,"audited_at":"2026-05-19T20:52:07.647334Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-540-74011-","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"9e6fef8b35a1720244d9fa838348d8d35d3a4a658d8207d43dee00de6f55b93a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3003,"event_type":"pith.integrity.v1","payload_sha256":"c5fbfed149bd415924b785dfdd9a2910294ee8601aeefd5fcf464aceec48f5ef","signature_b64":"eZROBNtYg2dWbH3wuI6NrUuFbhSukfRSdjtOve0D0l0xACFkampQtFfrdqRBVKVoDmBg0ITg5Hrf8/97A3QHAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:52:22.086967+00:00","payload":{"note":"DOI '10.1007/978-3-662-04821-' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Bielecki, T.R., Rutkowski, M.: (2002).Credit risk: Modelling, valuation and hedging. Springer Finance. Berlin: Springer. doi: 10.1007/978-3-662-04821-","arxiv_id":"2604.25696","detector":"doi_compliance","evidence":{"ref_index":2,"raw_excerpt":"Bielecki, T.R., Rutkowski, M.: (2002).Credit risk: Modelling, valuation and hedging. Springer Finance. Berlin: Springer. doi: 10.1007/978-3-662-04821-","verdict_class":"incontrovertible","doi_as_printed":"10.1007/978-3-662-04821-"},"severity":"critical","ref_index":2,"audited_at":"2026-05-19T20:52:07.647334Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-662-04821-","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"013daa368b0ccde25beb79d01fd6ca4139bf4c090d301833cf407503028d89d3","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.25696/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}