{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.08316","arxiv_id":"2605.08316","integrity":{"available":true,"endpoint":"/pith/2605.08316/integrity.json","summary":{"critical":3,"advisory":4,"informational":0,"by_detector":{"doi_compliance":{"total":7,"critical":3,"advisory":4,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T10:02:13.865673Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T04:49:12.375932Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:31:18.734636Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:30:15.656956Z","findings_count":7}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/access.2020.3041282' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/access.2020.3041282","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23015Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.14722/wosoc.2026.23015Workshop","detected_arxiv_id":null,"ref_index":53,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/access.2020.3044975' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/access.2020.3044975","detected_arxiv_id":null,"ref_index":156,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23016Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.14722/wosoc.2026.23016Workshop","detected_arxiv_id":null,"ref_index":20,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23013Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.14722/wosoc.2026.23013Workshop","detected_arxiv_id":null,"ref_index":75,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/prism.2026.23021Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.14722/prism.2026.23021Workshop","detected_arxiv_id":null,"ref_index":26,"audited_at":"2026-05-19T11:30:15.656956Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3697926.3697939' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3697926.3697939","detected_arxiv_id":null,"ref_index":76,"audited_at":"2026-05-19T11:30:15.656956Z"}],"snapshot_sha256":"018639bbca7aed6a9146ee19dbb5769dc7571a8ffeb7257cca6e377da2bf6cdb"},"events":[{"event_id":1045,"event_type":"pith.integrity.v1","payload_sha256":"ec85eed482c8018f618972d6b57d4aaea65430ee6b11703e4f894d731b1b7a54","signature_b64":"/lPNIiLpvYfwj8l4N1fpEXYEaDGsTWHfdCoBFA+i5tQ1BbZKMAf9wwbwy+BIJtzMTR5RvnhVOmSPSaACGTbQDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.828180+00:00","payload":{"note":"Identifier '10.1109/access.2020.3044975' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"M. Vielberth, F. Böhm, I. Fichtinger, and G. Pernul. 2020. Security Operations Center: A Systematic Study and Open Challenges.IEEE Access8 (2020), 227756–227779. doi:10.1109/ACCESS.2020.3044975","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"doi":"10.1109/access.2020.3044975","arxiv_id":null,"ref_index":156,"raw_excerpt":"M. Vielberth, F. Böhm, I. Fichtinger, and G. Pernul. 2020. Security Operations Center: A Systematic Study and Open Challenges.IEEE Access8 (2020), 227756–227779. doi:10.1109/ACCESS.2020.3044975","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":156,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/access.2020.3044975","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"2746a6f353a5132f2d9dbdfad6fad4ae14cafe67911dfee1fe5e17ae1de98966","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1044,"event_type":"pith.integrity.v1","payload_sha256":"7b1d5706ee240a20284648d0cf8239dfd1be3979c93b56cf340ce10ccbb00763","signature_b64":"vJwFz4MxVitJoptAUqQeYA1kEZ6Af49gXWsE4jFujbrC7ZUu/RD7D+fOsWA1OfJBnjimcYGLQBVTF4HV0qcaCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.825921+00:00","payload":{"note":"Identifier '10.1145/3697926.3697939' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Navodika M. Karunasingha, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris, and Salil S. Kanhere. 2025. SoK: AI Support for Analyst Situation Awareness in Security Operation Centres. In2025 European Symposium on Usable Security (EuroUSEC). ","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"doi":"10.1145/3697926.3697939","arxiv_id":null,"ref_index":76,"raw_excerpt":"Navodika M. Karunasingha, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris, and Salil S. Kanhere. 2025. SoK: AI Support for Analyst Situation Awareness in Security Operation Centres. In2025 European Symposium on Usable Security (EuroUSEC). ACM, New York, NY, USA, 151–163. doi:10.1145/3697926.3697939","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":76,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3697926.3697939","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"8681cdc5fcdb3e8a3460510cc374133ce8f55d0ccebd49859555a173d5c45ad6","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1043,"event_type":"pith.integrity.v1","payload_sha256":"1d6e9fecf47c56f6ae1c2e7107bd38391bc35359ea88352f9dae75e8cf157f6c","signature_b64":"Gn7g7Ovp6E98QRb1sERFx3v1XUqJAZaNFGtbIEyeHVvDus+WGJf1Swcqv2LpS+CzHquQx5KJtt1UcZPoDBgzDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.823562+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23013Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Takeshi Kaneko, Hiroyuki Okada, Rashi Sharma, Tatsumi Oba, and Naoto Yanai. 2026. PAIEL: Protocol-Aware and Context-Integrated Protocol Explanation Using LLMs for SOCs. doi:10.14722/wosoc.2026.23013 Workshop on Security Operations Center Op","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"ref_index":75,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Takeshi Kaneko, Hiroyuki Okada, Rashi Sharma, Tatsumi Oba, and Naoto Yanai. 2026. PAIEL: Protocol-Aware and Context-Integrated Protocol Explanation Using LLMs for SOCs. doi:10.14722/wosoc.2026.23013 Workshop on Security Operations Center Op","reconstructed_doi":"10.14722/wosoc.2026.23013Workshop"},"severity":"advisory","ref_index":75,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.14722/wosoc.2026.23013Workshop","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"140fcc73021dde1b1c498ebb683b14cddb203ae9ff68314cee13015904855742","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1042,"event_type":"pith.integrity.v1","payload_sha256":"ac90817d30b8743609c0bbae4ea02c024389a29acc34d2155db9c65b30a4297a","signature_b64":"JzK3CaDKwenM+vGfLHosP6CsEaFOPpQVdme/Ei6teMX4S178D/feYFvbak7MYdqWO8p6XHjF0CYx3GZ/tU7tAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.821575+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23015Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Non-Disruptive Disruption: An Empirical Experience of Introducing LLMs in the SOC. doi:10.14722/wosoc.2026.23015 Workshop on Security Operations Center (WOSOC), 2026","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"ref_index":53,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Non-Disruptive Disruption: An Empirical Experience of Introducing LLMs in the SOC. doi:10.14722/wosoc.2026.23015 Workshop on Security Operations Center (WOSOC), 2026","reconstructed_doi":"10.14722/wosoc.2026.23015Workshop"},"severity":"advisory","ref_index":53,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.14722/wosoc.2026.23015Workshop","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"67cb8db312658e0f9a706172605fcde5c10a7a09b0d9c8f4cb16367a40e8d615","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1041,"event_type":"pith.integrity.v1","payload_sha256":"5b6d75d260d4cf73417bf970fc657da42b134c6437ae218ed89086accb98320e","signature_b64":"rD3TJn5eLrT9POsY2v5R2khzB3Xn83OnaTvHquWX7wMhDJPCY9zrPOd/w5HZ51OjkNsa7ok9VQnZjnUp/RxADg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.819666+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/prism.2026.23021Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Qizhi Cai, Lingzhi Wang, Yao Zhu, Zhipeng Chen, Xiangmin Shen, and Zhenyuan Li. 2026. Building Next-Generation Datasets for Provenance-Based Intrusion Detection. doi:10.14722/prism.2026.23021 Workshop on Predictive and Robust Intrusion Syst","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"ref_index":26,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Qizhi Cai, Lingzhi Wang, Yao Zhu, Zhipeng Chen, Xiangmin Shen, and Zhenyuan Li. 2026. Building Next-Generation Datasets for Provenance-Based Intrusion Detection. doi:10.14722/prism.2026.23021 Workshop on Predictive and Robust Intrusion Syst","reconstructed_doi":"10.14722/prism.2026.23021Workshop"},"severity":"advisory","ref_index":26,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.14722/prism.2026.23021Workshop","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"47fb8933be2c655371e2d4b58c6d22b6f9ee60270823b6ea6760435894ca6626","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1040,"event_type":"pith.integrity.v1","payload_sha256":"53bf64dc60a1bba44d2f0614200537de11ca0bd5eb3e6dcced66ec71b03dc853","signature_b64":"hfkP4SZ5LlCpbXaHCWgymr7s18nS7i7iGnTJwqQ8ZXPluXaMz3DrOsCwuGz/o2kkfQnDxvcw7qY+uZZy5S5bCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.817358+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.14722/wosoc.2026.23016Workshop) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Kritan Banstola, Faayed Al Faisal, and Xinming Ou. 2026. Experiences of Using Agentic AI to Fill Tooling Gaps in a Security Operations Center. doi:10.14722/wosoc.2026.23016 Workshop on Security Operations Center (WOSOC), 2026","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"ref_index":20,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Kritan Banstola, Faayed Al Faisal, and Xinming Ou. 2026. Experiences of Using Agentic AI to Fill Tooling Gaps in a Security Operations Center. doi:10.14722/wosoc.2026.23016 Workshop on Security Operations Center (WOSOC), 2026","reconstructed_doi":"10.14722/wosoc.2026.23016Workshop"},"severity":"advisory","ref_index":20,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.14722/wosoc.2026.23016Workshop","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"6067fbef2a3fd4ac6c3eb8a96e2a509fdd38f99d09a9a675949b62308e7caee0","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1039,"event_type":"pith.integrity.v1","payload_sha256":"f441a423b3cc32f871a3ab7ac389b898ce06376a990915532a3c9b8f05ca4cf4","signature_b64":"MKwp51FSReAb6qYobFtNIQU5PW3doF79cxR31L+S0u5LezYpentocNWIe5u7LCB6tne3ekMLDyUO/fE78KG6CA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.813564+00:00","payload":{"note":"Identifier '10.1109/access.2020.3041282' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"M. E. Aminanto, T. Ban, R. Isawa, T. Takahashi, and D. Inoue. 2020. Threat Alert Prioritization Using Isolation Forest and Stacked Autoencoder with Day-Forward-Chaining Analysis.IEEE Access8 (2020), 217977–217986. doi:10.1109/ACCESS.2020.30","arxiv_id":"2605.08316","detector":"doi_compliance","evidence":{"doi":"10.1109/access.2020.3041282","arxiv_id":null,"ref_index":9,"raw_excerpt":"M. E. Aminanto, T. Ban, R. Isawa, T. Takahashi, and D. Inoue. 2020. Threat Alert Prioritization Using Isolation Forest and Stacked Autoencoder with Day-Forward-Chaining Analysis.IEEE Access8 (2020), 217977–217986. doi:10.1109/ACCESS.2020.3041282","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":9,"audited_at":"2026-05-19T11:30:15.656956Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/access.2020.3041282","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"b885ac06a5ccdc70ea86f5b70f36468df0eac89b2c352b1fcc389eea1bea2c31","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.08316/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}