Tri‐level transmission expansion planning under intentional attacks: virtual attacker approach – part I: formulation | Publicación