Tri-level transmission Expansion planning under intentional attacks: virtual attacker approach-part II: case studies

https://people.iut.ac.ir/en/yousefi/content/115894