{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.03034","arxiv_id":"2605.03034","integrity":{"available":true,"endpoint":"/pith/2605.03034/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T14:39:19.745087Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T02:01:22.176492Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:46:48.366487Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.5555/3304652.3304789) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.5555/3304652.3304789","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-19T15:46:48.366487Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/2832249.2832322' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/2832249.2832322","detected_arxiv_id":null,"ref_index":23,"audited_at":"2026-05-19T15:46:48.366487Z"}],"snapshot_sha256":"c6326a8a0cd8c383dd14176b609ca1e727496aac4f36b48aaf844290d5737dfe"},"events":[{"event_id":1920,"event_type":"pith.integrity.v1","payload_sha256":"78c26e3e32f2e9cc759a8942de3ccb8e2ed18855f1355abe11aa1df049eb5399","signature_b64":"7IydaLIFfyWUpqynH0CvxNBI5vcYLiQLBA0Z8XleIhwASUbeL/b3g4Czbx1XiFcWUmIkhdvlVD4PRQ/G0v8NCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:47:11.280484+00:00","payload":{"note":"Identifier '10.5555/2832249.2832322' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Optimal network security hardening using attack graph games, 2015. URL https://dl.acm.org/doi/ 10.5555/2832249.2832322","arxiv_id":"2605.03034","detector":"doi_compliance","evidence":{"doi":"10.5555/2832249.2832322","arxiv_id":null,"ref_index":23,"raw_excerpt":"Optimal network security hardening using attack graph games, 2015. URL https://dl.acm.org/doi/ 10.5555/2832249.2832322","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":23,"audited_at":"2026-05-19T15:46:48.366487Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/2832249.2832322","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"7ddb313041fb6b88d8ad64737859e37dd8e159f40508b878e7555aa952bc9aec","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1919,"event_type":"pith.integrity.v1","payload_sha256":"f5061c8814d1da062ca876f3c3331735c5a383a49007c49da228b829b51b5840","signature_b64":"KmtRcEgwpcwmPKifnYYz/X4TPHAyI/js36/mYY62Pz+jZ/4zAZSxrFjRZ2lmHQPMvNQGeLg7T59tSlZURmn1BQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:47:11.278294+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.5555/3304652.3304789) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Survey of Stackelberg Security Games, 2018. URL https://dl.acm.org/doi/10.5555/3304652. 3304789","arxiv_id":"2605.03034","detector":"doi_compliance","evidence":{"ref_index":22,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Survey of Stackelberg Security Games, 2018. URL https://dl.acm.org/doi/10.5555/3304652. 3304789","reconstructed_doi":"10.5555/3304652.3304789"},"severity":"advisory","ref_index":22,"audited_at":"2026-05-19T15:46:48.366487Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3304652.3304789","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4e779e715a530fa9c23c6423fd37f5765904636035caeddffe82d57d117e9b26","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.03034/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}