Figure 8: Data flow of the protection framework based on usage signatures.

figure 8