{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:CB7XVGMOYW5PWZXWM4SFPCJBQL","short_pith_number":"pith:CB7XVGMO","schema_version":"1.0","canonical_sha256":"107f7a998ec5bafb66f6672457892182f66d82299f4c60321ac9f367e404e996","source":{"kind":"arxiv","id":"1907.00332","version":1},"attestation_state":"computed","paper":{"title":"Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY","cs.HC"],"primary_cat":"cs.CR","authors_text":"Dario Pompili, Gabriel Salles-Loustau, Saman Zonouz, Vidyasagar Sadhu, Vincent Sritapan","submitted_at":"2019-06-30T07:03:05Z","abstract_excerpt":"Trustworthy operation of our national critical infrastructures, such as the electricity grid, against adversarial parties and accidental failures requires constant and secure monitoring capabilities. In this paper, Eyephone is presented to leverage secure smartphone sensing and data acquisition capabilities and enable pervasive sensing of the national critical infrastructures. The reported information by the smartphone users will notify the control center operators about particular accidental or malicious remote critical infrastructure incidents. The reporting will be proactive regarding poten"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1907.00332","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-06-30T07:03:05Z","cross_cats_sorted":["cs.CY","cs.HC"],"title_canon_sha256":"756e1add13b5b7748e9d8a6caadc49ec231e922120779f18081e45bd81862f9f","abstract_canon_sha256":"c9f5c7b697094ce7dfa91e3ce1dddf75cb5ed9989da351dfb49be26957588ed6"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:41:52.115820Z","signature_b64":"ESQR6s949pthTb/HHouYmom9tbPaWTo+ssz1hOhj/W2aYmhj2CQs5wLql3KazEhrDc/5s/6YcWI7sUeInhLMCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"107f7a998ec5bafb66f6672457892182f66d82299f4c60321ac9f367e404e996","last_reissued_at":"2026-05-17T23:41:52.115143Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:41:52.115143Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY","cs.HC"],"primary_cat":"cs.CR","authors_text":"Dario Pompili, Gabriel Salles-Loustau, Saman Zonouz, Vidyasagar Sadhu, Vincent Sritapan","submitted_at":"2019-06-30T07:03:05Z","abstract_excerpt":"Trustworthy operation of our national critical infrastructures, such as the electricity grid, against adversarial parties and accidental failures requires constant and secure monitoring capabilities. In this paper, Eyephone is presented to leverage secure smartphone sensing and data acquisition capabilities and enable pervasive sensing of the national critical infrastructures. The reported information by the smartphone users will notify the control center operators about particular accidental or malicious remote critical infrastructure incidents. The reporting will be proactive regarding poten"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.00332","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1907.00332","created_at":"2026-05-17T23:41:52.115246+00:00"},{"alias_kind":"arxiv_version","alias_value":"1907.00332v1","created_at":"2026-05-17T23:41:52.115246+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.00332","created_at":"2026-05-17T23:41:52.115246+00:00"},{"alias_kind":"pith_short_12","alias_value":"CB7XVGMOYW5P","created_at":"2026-05-18T12:33:12.712433+00:00"},{"alias_kind":"pith_short_16","alias_value":"CB7XVGMOYW5PWZXW","created_at":"2026-05-18T12:33:12.712433+00:00"},{"alias_kind":"pith_short_8","alias_value":"CB7XVGMO","created_at":"2026-05-18T12:33:12.712433+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL","json":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL.json","graph_json":"https://pith.science/api/pith-number/CB7XVGMOYW5PWZXWM4SFPCJBQL/graph.json","events_json":"https://pith.science/api/pith-number/CB7XVGMOYW5PWZXWM4SFPCJBQL/events.json","paper":"https://pith.science/paper/CB7XVGMO"},"agent_actions":{"view_html":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL","download_json":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL.json","view_paper":"https://pith.science/paper/CB7XVGMO","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1907.00332&json=true","fetch_graph":"https://pith.science/api/pith-number/CB7XVGMOYW5PWZXWM4SFPCJBQL/graph.json","fetch_events":"https://pith.science/api/pith-number/CB7XVGMOYW5PWZXWM4SFPCJBQL/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL/action/timestamp_anchor","attest_storage":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL/action/storage_attestation","attest_author":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL/action/author_attestation","sign_citation":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL/action/citation_signature","submit_replication":"https://pith.science/pith/CB7XVGMOYW5PWZXWM4SFPCJBQL/action/replication_record"}},"created_at":"2026-05-17T23:41:52.115246+00:00","updated_at":"2026-05-17T23:41:52.115246+00:00"}