{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.15874","arxiv_id":"2605.15874","integrity":{"available":true,"endpoint":"/pith/2605.15874/integrity.json","summary":{"critical":1,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":1,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T21:01:28.856495Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T20:44:36.903554Z","findings_count":4},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T17:02:07.763753Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T17:33:47.532504Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x","detected_arxiv_id":null,"ref_index":4,"audited_at":"2026-05-20T20:44:36.903554Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-20T20:44:36.903554Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","detected_arxiv_id":null,"ref_index":34,"audited_at":"2026-05-20T20:44:36.903554Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf","detected_arxiv_id":null,"ref_index":43,"audited_at":"2026-05-20T20:44:36.903554Z"}],"snapshot_sha256":"069b5454771f9e37b12fef68d570314003c756322ce3fdaebdb4098c47d44889"},"events":[{"event_id":5447,"event_type":"pith.integrity.v1","payload_sha256":"61b9c4e796ffe585ace40bfae63c8051a075298630c245395b30d835986971eb","signature_b64":"uxUMbULx1NgSis2lChaW7p5zg2XwGrzN9Qw2+eQRhDN7Ux35GK+pxuByFAe23yVOOL4TY7i3x4hUcGyzuZGtCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T20:48:31.773928+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.,2017. Characterizingcyber-physicalattacksonwaterdistribution systems. Journal of Water Resources Planning and Management 143, 04017009. doi:10.1061/(ASCE)WR.1943-5452.0","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":43,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.,2017. Characterizingcyber-physicalattacksonwaterdistribution systems. Journal of Water Resources Planning and Management 143, 04017009. doi:10.1061/(ASCE)WR.1943-5452.0","reconstructed_doi":"10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf"},"severity":"advisory","ref_index":43,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4a65d7dbd98089e16cb8e10b1c3a0074dee6edf11bb4a972af4f470ab4d128cd","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":5446,"event_type":"pith.integrity.v1","payload_sha256":"3c0923d421b3fec4dc51a18688838572901cb20490c6db44c7e0bd3f383c5972","signature_b64":"eDYXPzOA+4fCIcV7Zku0IkIqTvOhdeq4jrrPCgY0wu/JQ+4S0T8BClTaEN0enJE7AyYW3Tz2WyYqpCNrPEDuBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T20:48:31.770309+00:00","payload":{"note":"Identifier '10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Liu, J., Sha, Y., Zhang, W., Yan, Y., Liu, X., 2024. Anomaly detection method for industrial control system operation data based on time–frequency fusion feature attention encoding. Sensors 24. doi:10.3390/s24186131.https://www.mdpi.com/142","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"doi":"10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","arxiv_id":null,"ref_index":34,"raw_excerpt":"Liu, J., Sha, Y., Zhang, W., Yan, Y., Liu, X., 2024. Anomaly detection method for industrial control system operation data based on time–frequency fusion feature attention encoding. Sensors 24. doi:10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":34,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"e30cac1af1f584f8ab38a9dd5942f03b63223583436a9685f37e80bb0ef8d89a","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":5445,"event_type":"pith.integrity.v1","payload_sha256":"373f7e871cd632e3a2431050cde3b34baef93020f63d2f2b1081cfc0427f691e","signature_b64":"ouDK7zT9QJPlbJUBiTAt47H5EABuJnqz/oGSIURhA1tHOOsYJBj5594xUObNkcAF+epIth9UZj3j9v96x/QEDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T20:48:31.765237+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Amin,S.,Litrico,X.,Sastry,S.,Bayen,A.M.,2013. Cybersecurityof waterscadasystems—parti:Analysisandexperimentationofstealthy deception attacks. IEEE Transactions on Control Systems Technol- ogy 21, 1963–1970. doi:10.1109/TCST.2012.2211873.htt","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Amin,S.,Litrico,X.,Sastry,S.,Bayen,A.M.,2013. Cybersecurityof waterscadasystems—parti:Analysisandexperimentationofstealthy deception attacks. IEEE Transactions on Control Systems Technol- ogy 21, 1963–1970. doi:10.1109/TCST.2012.2211873.htt","reconstructed_doi":"10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9c59ba38d948e508599c5e309372f68d7945d65211d122ba1f55ebe068da3902","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":5444,"event_type":"pith.integrity.v1","payload_sha256":"207f31907cb64cf983cd7ccd6696cf2c78501da8c4aed04093ca6dedab6d9eac","signature_b64":"rd/taTImeE2HTJpRQ4k+sZ0v9J9D4Q5jHBNLzyQUSatmAua5PTxdti9mkhmQ/BtFER/XDp/EjHhfUssJZWDYDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T20:48:31.759011+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Aly, M., Behiry, M.H., 2025. Enhancing anomaly detection in iot-driven factories using logistic boosting, random forest, and svm: A comparative machine learning approach. Scientific Re- ports 15. doi:10.1038/s41598-025-08436-x.https://doi.o","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":4,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Aly, M., Behiry, M.H., 2025. Enhancing anomaly detection in iot-driven factories using logistic boosting, random forest, and svm: A comparative machine learning approach. Scientific Re- ports 15. doi:10.1038/s41598-025-08436-x.https://doi.o","reconstructed_doi":"10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x"},"severity":"advisory","ref_index":4,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"fd67852aa0950657a946ba2946e1c047690f62fea027c2766889dc415843aa27","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.15874/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}