Security-Constrained Optimal Power Flow via Cross-Entropy Method