Network constrained security control using an interior point algorithm | IEEE Journals & Magazine | IEEE Xplore