{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.16167","arxiv_id":"2605.16167","integrity":{"available":true,"endpoint":"/pith/2605.16167/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-21T17:31:43.532178Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-21T17:19:34.001569Z","findings_count":1},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-21T16:42:31.554488Z","findings_count":0},{"name":"cited_work_retraction","version":"1.0.0","status":"completed","ran_at":"2026-05-19T17:52:15.101092Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T17:33:31.033109Z","findings_count":0},{"name":"external_links","version":"1.0.0","status":"completed","ran_at":"2026-05-19T17:31:46.597218Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/j.ijcip.2022.100505' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/j.ijcip.2022.100505","detected_arxiv_id":null,"ref_index":36,"audited_at":"2026-05-20T17:12:51.133766Z"}],"snapshot_sha256":"aea251e511f6e833dc8e9e3758e9628c3bca731206a0a0bbeba19e98d551893b"},"events":[{"event_id":5296,"event_type":"pith.integrity.v1","payload_sha256":"8067a5d40b572009bdcf8dd7ad5a6bf5959abfcfa1f70a5df954fcf631f0ebd8","signature_b64":"niCuCO5pvWweQC8VyZZdC0eGsQOnITQKWO1jRNbMd9uFOpwnpdrVQ7aFgO9Yq1eZ+6ftyhFYz/fd+QyuZCCvDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T17:13:17.177390+00:00","payload":{"note":"Identifier '10.1016/j.ijcip.2022.100505' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, \"A cyber incident response and recovery framework to support operators of industrial control systems,\" International Journal of Critical Infrastructure Protec","arxiv_id":"2605.16167","detector":"doi_compliance","evidence":{"doi":"10.1016/j.ijcip.2022.100505","arxiv_id":null,"ref_index":36,"raw_excerpt":"A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, \"A cyber incident response and recovery framework to support operators of industrial control systems,\" International Journal of Critical Infrastructure Protection, vol. 37, Art. no. 100505, 2022, doi: 10.1016/j.ijcip.2022.100505. [25]J.Huang, J.Xu, X.Xing, P.Liu, andM.K.Qureshi, \"FlashGuard: Leveragingintrinsicflash ","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":36,"audited_at":"2026-05-20T17:12:51.133766Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.ijcip.2022.100505","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"fa08feb129836f89028ebfdc116a3cb2b362523a0e26e85659d839ac5510ce46","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.16167/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}