{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.13069","arxiv_id":"2605.13069","integrity":{"available":true,"endpoint":"/pith/2605.13069/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T10:31:23.920285Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T07:56:18.654285Z","findings_count":2},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:21:57.483296Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T09:34:50.648901Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.CSWP.29.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.6028/NIST.CSWP.29.url","detected_arxiv_id":null,"ref_index":32,"audited_at":"2026-05-19T06:50:02.841075Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.SP.800-160v2r1.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.6028/NIST.SP.800-160v2r1.url","detected_arxiv_id":null,"ref_index":34,"audited_at":"2026-05-19T06:50:02.841075Z"}],"snapshot_sha256":"6d54c0deb326782f6d57857c80434e348d9f7fe506990acdca84d987483bc085"},"events":[{"event_id":214,"event_type":"pith.integrity.v1","payload_sha256":"3ed9f3bf9024c399b7a685add9c612802bdced5810b150342598c8d247d04cee","signature_b64":"arW5hKzFWQB5jdqjz26OBCBbNOYtG1vlcFJ201T8ldGDmYc0bH09vdl5jq9+bEMae2emCj9txNIIFz77iFTwBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T06:51:53.401457+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.SP.800-160v2r1.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ronald S. Ross et al. Developing Cyber-Resilient Systems: A Systems Security En- gineering Approach. Special Publication NIST SP 800-160 Vol. 2 Rev. 1. National Institute of Standards and Technology, Dec. 2021. doi: 10.6028/NIST.SP.800- 160","arxiv_id":"2605.13069","detector":"doi_compliance","evidence":{"ref_index":34,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ronald S. Ross et al. Developing Cyber-Resilient Systems: A Systems Security En- gineering Approach. Special Publication NIST SP 800-160 Vol. 2 Rev. 1. National Institute of Standards and Technology, Dec. 2021. doi: 10.6028/NIST.SP.800- 160","reconstructed_doi":"10.6028/NIST.SP.800-160v2r1.url"},"severity":"advisory","ref_index":34,"audited_at":"2026-05-19T06:50:02.841075Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/NIST.SP.800-160v2r1.url","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7378792d5286af71a44782fd5ca7743aa00703f8e8a97d25aea718bcf5d285f1","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":213,"event_type":"pith.integrity.v1","payload_sha256":"3df49eeae06251fa4c8cc027c485a67664ccebd81e8e8e89b92144a3ceb46ac5","signature_b64":"xKFIJWKV8AfvdgvtZuupEUz6RbIOllUwk+fEk/vgEtxtYX4pIChYPIozPjnZBB2dyjEgyWM4XdfkdJDNPfWVDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T06:51:53.400060+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.CSWP.29.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Cherilyn Pascoe, Stephen Quinn, and Karen Scarfone. The NIST Cybersecurity Framework (CSF) 2.0 . NIST Cybersecurity White Paper NIST CSWP 29. Na- tional Institute of Standards and Technology, Feb. 26, 2024. doi: 10.6028/NIST. CSWP.29. url: ","arxiv_id":"2605.13069","detector":"doi_compliance","evidence":{"ref_index":32,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Cherilyn Pascoe, Stephen Quinn, and Karen Scarfone. The NIST Cybersecurity Framework (CSF) 2.0 . NIST Cybersecurity White Paper NIST CSWP 29. Na- tional Institute of Standards and Technology, Feb. 26, 2024. doi: 10.6028/NIST. CSWP.29. url: ","reconstructed_doi":"10.6028/NIST.CSWP.29.url"},"severity":"advisory","ref_index":32,"audited_at":"2026-05-19T06:50:02.841075Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/NIST.CSWP.29.url","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"af8f76675513f7cdcef0cd298c4694030d023b1a311b4913a187198752d253bf","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.13069/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}