Figure 8:
Data flow of the protection framework based on usage signatures.