{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.10867","arxiv_id":"2605.10867","integrity":{"available":true,"endpoint":"/pith/2605.10867/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:02:01.052145Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T14:34:07.136361Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T10:31:17.443375Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T08:56:18.304026Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-19T08:56:18.304026Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICECET52533.2021.9698532.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ICECET52533.2021.9698532.12","detected_arxiv_id":null,"ref_index":28,"audited_at":"2026-05-19T08:56:18.304026Z"}],"snapshot_sha256":"90bad5e135ed6b8856098794d33d3828f36c896ce36f5c71550b980beb3ecfbb"},"events":[{"event_id":539,"event_type":"pith.integrity.v1","payload_sha256":"da77f8ee5b25a55b0dc5b20ab0dd3de39b8a4b9ea5cfeb8233a4b8d0c319cea5","signature_b64":"2hJtEXMZr7qWEoDMced9hE+NxEpQpqTI9vEpzRg3EW4f+SDxW3saDoztCqb5jtjr7jSMrbvdXC6pLMPOOkYxCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T08:56:57.122671+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICECET52533.2021.9698532.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Nyle Siddiqui, Rushit Dave, and Naeem Seliya. Continuous user authentication using mouse dynamics, machine learning, and minecraft. In2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1–6, 2021. d","arxiv_id":"2605.10867","detector":"doi_compliance","evidence":{"ref_index":28,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Nyle Siddiqui, Rushit Dave, and Naeem Seliya. Continuous user authentication using mouse dynamics, machine learning, and minecraft. In2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1–6, 2021. d","reconstructed_doi":"10.1109/ICECET52533.2021.9698532.12"},"severity":"advisory","ref_index":28,"audited_at":"2026-05-19T08:56:18.304026Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICECET52533.2021.9698532.12","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7b3f2c4cb49c26005d63d58ac80eed9585884a9832cac252483f1e9f2d8f286e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":538,"event_type":"pith.integrity.v1","payload_sha256":"0355df47d806088dc075308c7fdc74bf971bc136ba50a94f031033ee8a1e3a1f","signature_b64":"jr4DvWTz6wzyWLxau6Xi7o9KsRXlWhODebTmbe9TPeLWcyT2i6r2BPcmIsN0beuz7zTETk6YnCm8NEr2GAseCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T08:56:57.120042+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ahmed Abbas, Tareq Abed Mohammed, Zena Ez Dallalbash, and Adil Khalil. Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20, 2026. d","arxiv_id":"2605.10867","detector":"doi_compliance","evidence":{"ref_index":1,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ahmed Abbas, Tareq Abed Mohammed, Zena Ez Dallalbash, and Adil Khalil. Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20, 2026. d","reconstructed_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW"},"severity":"advisory","ref_index":1,"audited_at":"2026-05-19T08:56:18.304026Z","event_type":"pith.integrity.v1","detected_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"714e872ece47ac0325b4aecd798f3233e348812aebad464ce9b94664ab12b7bf","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.10867/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}