{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.08449","arxiv_id":"2605.08449","integrity":{"available":true,"endpoint":"/pith/2605.08449/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T09:22:02.087928Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T04:35:54.966405Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:01:17.856982Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:07:46.959643Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.7249/RRA28491) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.7249/RRA28491","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-19T11:07:46.959643Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.SP.800161r1-upd1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.6028/NIST.SP.800161r1-upd1","detected_arxiv_id":null,"ref_index":3,"audited_at":"2026-05-19T11:07:46.959643Z"}],"snapshot_sha256":"699cc148a58e2b199c85a6c09a10b8dfabc3250c6cabed51aefec59b60335823"},"events":[{"event_id":922,"event_type":"pith.integrity.v1","payload_sha256":"8bc41219f242853140f3df3b61b063ffd1ccfc2c6e5a50d66be0d7cf56b3c092","signature_b64":"6KnXzduJcwocxnsXIWofiu+ldT8nN0AlYj9gNxo2EudhgrMGyjhtrOL4iphjg4gIg8jGREMXkk8x2TOk4wnjDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:12:00.872034+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.SP.800161r1-upd1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"doi: 10.6028/NIST.SP.800161r1-upd1. Online. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800161r1-upd1.pdf 4 Committee on National Security Systems, “Security Categorization and Control Selection for Nation","arxiv_id":"2605.08449","detector":"doi_compliance","evidence":{"ref_index":3,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"doi: 10.6028/NIST.SP.800161r1-upd1. Online. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800161r1-upd1.pdf 4 Committee on National Security Systems, “Security Categorization and Control Selection for Nation","reconstructed_doi":"10.6028/NIST.SP.800161r1-upd1"},"severity":"advisory","ref_index":3,"audited_at":"2026-05-19T11:07:46.959643Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/NIST.SP.800161r1-upd1","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"57936030233e8026f8cb4531c301eb2f0d9bd1c903bb2b311f7136a574108d21","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":921,"event_type":"pith.integrity.v1","payload_sha256":"c5651087c8001c0fa23b5141ffcec4ab48d4f173c4c34fddcaa79272f6c35e67","signature_b64":"v01MCcmQCts5VQ/GzG2QbQDjZAncKmc6mRWss4U/Eu2jJHn8J5xPJ81Yq0v8bVzoJmx+hL7gVkGbMxl0Gdw8Bg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:12:00.868643+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.7249/RRA28491) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"doi: 10.7249/RRA28491. Online. Available: https://www.rand.org/pubs/research_reports/RRA28491.html 2 Joint Task Force, “Security and Privacy Controls for Information Systems and Organizations,ˮ NIST Special Publication 80053, Rev. 5 ","arxiv_id":"2605.08449","detector":"doi_compliance","evidence":{"ref_index":1,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"doi: 10.7249/RRA28491. Online. Available: https://www.rand.org/pubs/research_reports/RRA28491.html 2 Joint Task Force, “Security and Privacy Controls for Information Systems and Organizations,ˮ NIST Special Publication 80053, Rev. 5 ","reconstructed_doi":"10.7249/RRA28491"},"severity":"advisory","ref_index":1,"audited_at":"2026-05-19T11:07:46.959643Z","event_type":"pith.integrity.v1","detected_doi":"10.7249/RRA28491","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"397b86ae20b3b6e2c9c0e9e3ca99b6817ae594d702fe0098a54120fba617a5d4","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.08449/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}