{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2026:BM24ZGHEYETSP3J3RG3XJBZAA3","short_pith_number":"pith:BM24ZGHE","schema_version":"1.0","canonical_sha256":"0b35cc98e4c12727ed3b89b774872006e2b9c728296b22a23ecc7aab4d93a7db","source":{"kind":"arxiv","id":"2605.17703","version":1},"attestation_state":"computed","paper":{"title":"LITE-SOC: Lightweight Security Operations Center Simulator for Cybersecurity Education","license":"http://creativecommons.org/licenses/by/4.0/","headline":"A lightweight web-based simulator lets students practice SOC alert triage, prioritization, and communication in regular classrooms.","cross_cats":["cs.HC"],"primary_cat":"cs.CR","authors_text":"Cherry Mangla, Martin Higgins, Shawn Thompson","submitted_at":"2026-05-17T23:57:30Z","abstract_excerpt":"This innovative practice WIP paper describes \\emph{LITE-SOC}, a lightweight web-based Security Operations Center (SOC) simulator designed for instructor-led cybersecurity education. SOC analysts must triage large volumes of alerts, separate genuine threats from false positives, and communicate decisions under time pressure. Recreating this environment in the classroom is difficult and often impractical for institutions without access to cyber ranges or enterprise security infrastructure. LITE-SOC was developed to provide a simpler alternative. The platform generates continuous streams of synth"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":true,"formal_links_present":true},"canonical_record":{"source":{"id":"2605.17703","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-17T23:57:30Z","cross_cats_sorted":["cs.HC"],"title_canon_sha256":"b3caa70c0d9ae2adf0c35ee6dd324ace45176053196b37bab4de63b543028cb0","abstract_canon_sha256":"eaecdee7682ebfac35dfdf01be12827f871e778fe504afb91ea71890aac07133"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:04:53.616513Z","signature_b64":"+FcrQmpK1EwxZwogjKjz+cIH6OW0EQQf59d2vpumlj+k7hISvCQLePGPG7j/sYmbrJhBVLR1zOQ7Yx0YeqNzAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0b35cc98e4c12727ed3b89b774872006e2b9c728296b22a23ecc7aab4d93a7db","last_reissued_at":"2026-05-20T00:04:53.615686Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:04:53.615686Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"LITE-SOC: Lightweight Security Operations Center Simulator for Cybersecurity Education","license":"http://creativecommons.org/licenses/by/4.0/","headline":"A lightweight web-based simulator lets students practice SOC alert triage, prioritization, and communication in regular classrooms.","cross_cats":["cs.HC"],"primary_cat":"cs.CR","authors_text":"Cherry Mangla, Martin Higgins, Shawn Thompson","submitted_at":"2026-05-17T23:57:30Z","abstract_excerpt":"This innovative practice WIP paper describes \\emph{LITE-SOC}, a lightweight web-based Security Operations Center (SOC) simulator designed for instructor-led cybersecurity education. SOC analysts must triage large volumes of alerts, separate genuine threats from false positives, and communicate decisions under time pressure. Recreating this environment in the classroom is difficult and often impractical for institutions without access to cyber ranges or enterprise security infrastructure. LITE-SOC was developed to provide a simpler alternative. The platform generates continuous streams of synth"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"LITE-SOC was developed to provide a simpler alternative to full operational SOC environments for giving students a practical introduction to SOC workflows such as triage, prioritization, and decision-making.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"The assumption that synthetic event streams and the platform's visualization, annotation, and chat features are sufficiently realistic to develop transferable triage and communication skills in students.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"LITE-SOC is a lightweight web-based platform that simulates Security Operations Center alert streams and provides separate student and instructor interfaces for guided classroom exercises on triage and decision-making.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"A lightweight web-based simulator lets students practice SOC alert triage, prioritization, and communication in regular classrooms.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"74b20f2e277ef0edcc0b2f3109a5533a1630045fdcd1b193ad36bfc68ce8e86b"},"source":{"id":"2605.17703","kind":"arxiv","version":1},"verdict":{"id":"28a0ba76-d1fe-4987-8032-ae9a2380943e","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-19T22:40:02.340113Z","strongest_claim":"LITE-SOC was developed to provide a simpler alternative to full operational SOC environments for giving students a practical introduction to SOC workflows such as triage, prioritization, and decision-making.","one_line_summary":"LITE-SOC is a lightweight web-based platform that simulates Security Operations Center alert streams and provides separate student and instructor interfaces for guided classroom exercises on triage and decision-making.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"The assumption that synthetic event streams and the platform's visualization, annotation, and chat features are sufficiently realistic to develop transferable triage and communication skills in students.","pith_extraction_headline":"A lightweight web-based simulator lets students practice SOC alert triage, prioritization, and communication in regular classrooms."},"integrity":{"clean":false,"summary":{"advisory":1,"critical":2,"by_detector":{"doi_compliance":{"total":3,"advisory":1,"critical":2,"informational":0}},"informational":0},"endpoint":"/pith/2605.17703/integrity.json","findings":[{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1108/jarhe-02-2024-0072/full/html) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detector":"doi_compliance","severity":"advisory","ref_index":5,"audited_at":"2026-05-19T22:50:56.775941Z","detected_doi":"10.1108/jarhe-02-2024-0072/full/html","finding_type":"recoverable_identifier","verdict_class":"incontrovertible","detected_arxiv_id":null},{"note":"Identifier '10.1109/mitp.2024.3527268' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detector":"doi_compliance","severity":"critical","ref_index":1,"audited_at":"2026-05-19T22:50:56.775941Z","detected_doi":"10.1109/mitp.2024.3527268","finding_type":"unresolvable_identifier","verdict_class":"cross_source","detected_arxiv_id":null},{"note":"Identifier '10.1109/msec.2020.2978510' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detector":"doi_compliance","severity":"critical","ref_index":4,"audited_at":"2026-05-19T22:50:56.775941Z","detected_doi":"10.1109/msec.2020.2978510","finding_type":"unresolvable_identifier","verdict_class":"cross_source","detected_arxiv_id":null}],"available":true,"detectors_run":[{"name":"doi_title_agreement","ran_at":"2026-05-19T23:01:19.410929Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_compliance","ran_at":"2026-05-19T22:50:56.775941Z","status":"completed","version":"1.0.0","findings_count":3},{"name":"shingle_duplication","ran_at":"2026-05-19T21:49:43.480617Z","status":"skipped","version":"0.1.0","findings_count":0},{"name":"citation_quote_validity","ran_at":"2026-05-19T21:49:43.310002Z","status":"skipped","version":"0.1.0","findings_count":0},{"name":"ai_meta_artifact","ran_at":"2026-05-19T21:33:23.513674Z","status":"skipped","version":"1.0.0","findings_count":0},{"name":"cited_work_retraction","ran_at":"2026-05-19T21:21:59.275592Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T21:21:57.421101Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"a0421a6cf2254b666f0572217cf93c46abc9e9827929869647e7d6fe7049e799"},"references":{"count":13,"sample":[{"doi":"10.1109/mitp.2024.3527268","year":2025,"title":"Secu- rity by Design Issues in Autonomous Vehicles,","work_id":"e1249672-dc56-4057-82cd-a413544b61d4","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2023,"title":"Spatial-Temporal Anomaly Detection for Sensor Attacks in Autonomous Vehicles,","work_id":"74a62676-c465-4651-921d-b8b41e371695","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1109/access.2020.3045514","year":2020,"title":"Security Operations Center: A Systematic Study and Open Challenges,","work_id":"daf6c166-3fdf-4600-902b-f5f2636ccf44","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1109/msec.2020.2978510","year":2020,"title":"Cyber Ranges and Testbeds for Education, Training, and Research,","work_id":"d2100b64-d73f-44e4-b2b9-f9e9e7e7e473","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1108/jarhe-02-202","year":2024,"title":"Gamification in Cybersecurity Education: A State of the Art Review and Research Agenda,","work_id":"825c4173-8234-4a72-a9b5-20a354ede1d3","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":13,"snapshot_sha256":"470e60a8e5dfb2d37124a94c9ad075f68f6068ce9169bcc39e27dc5cf509cb3d","internal_anchors":0},"formal_canon":{"evidence_count":2,"snapshot_sha256":"f5a6f90cb1103333d0a1ffab09e256956049722d07af50cb6868c9fa18c2ed91"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2605.17703","created_at":"2026-05-20T00:04:53.615838+00:00"},{"alias_kind":"arxiv_version","alias_value":"2605.17703v1","created_at":"2026-05-20T00:04:53.615838+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.17703","created_at":"2026-05-20T00:04:53.615838+00:00"},{"alias_kind":"pith_short_12","alias_value":"BM24ZGHEYETS","created_at":"2026-05-20T00:04:53.615838+00:00"},{"alias_kind":"pith_short_16","alias_value":"BM24ZGHEYETSP3J3","created_at":"2026-05-20T00:04:53.615838+00:00"},{"alias_kind":"pith_short_8","alias_value":"BM24ZGHE","created_at":"2026-05-20T00:04:53.615838+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":2,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3","json":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3.json","graph_json":"https://pith.science/api/pith-number/BM24ZGHEYETSP3J3RG3XJBZAA3/graph.json","events_json":"https://pith.science/api/pith-number/BM24ZGHEYETSP3J3RG3XJBZAA3/events.json","paper":"https://pith.science/paper/BM24ZGHE"},"agent_actions":{"view_html":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3","download_json":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3.json","view_paper":"https://pith.science/paper/BM24ZGHE","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2605.17703&json=true","fetch_graph":"https://pith.science/api/pith-number/BM24ZGHEYETSP3J3RG3XJBZAA3/graph.json","fetch_events":"https://pith.science/api/pith-number/BM24ZGHEYETSP3J3RG3XJBZAA3/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3/action/timestamp_anchor","attest_storage":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3/action/storage_attestation","attest_author":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3/action/author_attestation","sign_citation":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3/action/citation_signature","submit_replication":"https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3/action/replication_record"}},"created_at":"2026-05-20T00:04:53.615838+00:00","updated_at":"2026-05-20T00:04:53.615838+00:00"}