Tri‐level transmission Expansion planning under intentional attacks: virtual attacker approach‐part II: case studies | Publicación