Transmission line reinforcements considering security constraints | IEEE Conference Publication | IEEE Xplore