Return to Article Details Applying Bio-Inspired Optimization Algorithms to Secure Network Protocols: A Study Using the Lotus Effect Optimization Algorithm Download Download PDF