The cascade vulnerability problem | IEEE Conference Publication | IEEE Xplore