{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.17703","arxiv_id":"2605.17703","integrity":{"available":true,"endpoint":"/pith/2605.17703/integrity.json","summary":{"critical":2,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":2,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T23:01:19.410929Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:50:56.775941Z","findings_count":3},{"name":"shingle_duplication","version":"0.1.0","status":"skipped","ran_at":"2026-05-19T21:49:43.480617Z","findings_count":0},{"name":"citation_quote_validity","version":"0.1.0","status":"skipped","ran_at":"2026-05-19T21:49:43.310002Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T21:33:23.513674Z","findings_count":0},{"name":"cited_work_retraction","version":"1.0.0","status":"completed","ran_at":"2026-05-19T21:21:59.275592Z","findings_count":0},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-19T21:21:57.421101Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1108/jarhe-02-2024-0072/full/html) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1108/jarhe-02-2024-0072/full/html","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-19T22:50:56.775941Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/mitp.2024.3527268' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/mitp.2024.3527268","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-19T22:50:56.775941Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/msec.2020.2978510' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/msec.2020.2978510","detected_arxiv_id":null,"ref_index":4,"audited_at":"2026-05-19T22:50:56.775941Z"}],"snapshot_sha256":"a0421a6cf2254b666f0572217cf93c46abc9e9827929869647e7d6fe7049e799"},"events":[{"event_id":3520,"event_type":"pith.integrity.v1","payload_sha256":"ffffee29e6098a462f37cf1e2b2351603035e095d297678d585d59bb7379808f","signature_b64":"Q5EVWHcutitd2oi8xowNic9p9UuaJHDUWCxiXvw62SblLn7lL4TjlFDeLzbuK21e8BTauxi0LhJ9dhnOQVwcCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:52:25.872253+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1108/jarhe-02-2024-0072/full/html) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"D. Pramod, “Gamification in Cybersecurity Education: A State of the Art Review and Research Agenda,”Journal of Applied Research in Higher Education, 2024. [Online]. Available: https: //www.emerald.com/insight/content/doi/10.1108/jarhe-02-20","arxiv_id":"2605.17703","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"D. Pramod, “Gamification in Cybersecurity Education: A State of the Art Review and Research Agenda,”Journal of Applied Research in Higher Education, 2024. [Online]. Available: https: //www.emerald.com/insight/content/doi/10.1108/jarhe-02-20","reconstructed_doi":"10.1108/jarhe-02-2024-0072/full/html"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-19T22:50:56.775941Z","event_type":"pith.integrity.v1","detected_doi":"10.1108/jarhe-02-2024-0072/full/html","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3c7703e7e992f21db64a66f6a0e5a74ac3727a188001a9a371cb648f01076302","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3519,"event_type":"pith.integrity.v1","payload_sha256":"c735c6781957d1d5e3bfc9366c12d3131a24c4afa096452a305e1348c043aab9","signature_b64":"mxSfxKPCDkLJtZFGxb4hYngoFAgbwdmQkmOz/Oi4eHepQTOv49A68dr4CErEb3T1czvEphZE7Ft1hMTsPpzgBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:52:25.870855+00:00","payload":{"note":"Identifier '10.1109/msec.2020.2978510' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"M. M. Yamin, B. Katt, and V . Gkioulos, “Cyber Ranges and Testbeds for Education, Training, and Research,”IEEE Security & Privacy, vol. 18, no. 3, pp. 63–70, May–Jun. 2020. [Online]. Available: https://doi.org/10.1109/MSEC.2020.2978510","arxiv_id":"2605.17703","detector":"doi_compliance","evidence":{"doi":"10.1109/msec.2020.2978510","arxiv_id":null,"ref_index":4,"raw_excerpt":"M. M. Yamin, B. Katt, and V . Gkioulos, “Cyber Ranges and Testbeds for Education, Training, and Research,”IEEE Security & Privacy, vol. 18, no. 3, pp. 63–70, May–Jun. 2020. [Online]. Available: https://doi.org/10.1109/MSEC.2020.2978510","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":4,"audited_at":"2026-05-19T22:50:56.775941Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/msec.2020.2978510","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"87f6e4e4018bd6d2fd421c004d12f71b7a5c959578e78b05d7a06274091c7de8","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3518,"event_type":"pith.integrity.v1","payload_sha256":"dc6bdd9b568bcb834adcda0fc2c948c4de40629ec36a7ddf2529ef8268433cc5","signature_b64":"JQicv/wS9D6IjyoAgzPtkaUAUUa9AW3pT7kP+3b6Dj+2mPVyEl8OqdBLyKfIZ/LS8tLCYHQR/UUSDqtyYoIiCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:52:25.868853+00:00","payload":{"note":"Identifier '10.1109/mitp.2024.3527268' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"M. Higgins, D. Jha, D. Blundell, and D. Wallom, “Secu- rity by Design Issues in Autonomous Vehicles,”IT Pro- fessional, vol. 27, no. 1, pp. 50–56, Jan.–Feb. 2025, doi: 10.1109/MITP.2024.3527268","arxiv_id":"2605.17703","detector":"doi_compliance","evidence":{"doi":"10.1109/mitp.2024.3527268","arxiv_id":null,"ref_index":1,"raw_excerpt":"M. Higgins, D. Jha, D. Blundell, and D. Wallom, “Secu- rity by Design Issues in Autonomous Vehicles,”IT Pro- fessional, vol. 27, no. 1, pp. 50–56, Jan.–Feb. 2025, doi: 10.1109/MITP.2024.3527268","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":1,"audited_at":"2026-05-19T22:50:56.775941Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/mitp.2024.3527268","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"9df264350a2e84576f1143d6b9414b69b6010c71573f1fb9e75d851edbf116ac","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.17703/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}