The basic requirement for security analysis is to assess the impact of any possible contingency on system performance. For the purpose of setting planning and operating rules that will enable the system to be operated in a secure manner, it is necessary to consider all credible contingencies, different network configurations, and different operating points for given performance criteria. Hence, in the deterministic approach, these assessments may involve a large number of computer simulations even if there is a selection process at each stage of the analysis. The decision in that case is founded on the requirement that each outage event in a specified list, the contingency set, results in system performance that satisfies the criteria of the chosen performance evaluation. To handle these assessments for all possible situations by an exhaustive study is generally not reasonable. Since the resulting security rules may lead to the settlement and schedule of investment needs as well as op...