Load shedding considering transient security and overload constraints | IEEE Conference Publication | IEEE Xplore