Integrating security constraints in optimal power flow studies | IEEE Conference Publication | IEEE Xplore