Solving security-constrained transmission switching using column-and-constraint substitution | IET Conference Publication | IEEE Xplore