...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1a84fad7ea36bb83-bc65689b-432e4b85-a71986e4-ef0efd7b89fc577b0f76f86a"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE ID 111 | http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="22ed2231133accee-8adda0d5-425e41f0-8e879776-54070a8e8f16cafabbab1016"><ac:plain-text-body><![CDATA[ | [[Fairbanks 2007 | AA. Bibliography#Fairbanks 07]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="70738a0190b69b13-30cabe7c-482a473c-aa3e884c-dfc6f3e17cc3c22cc9474ee1"><ac:plain-text-body><![CDATA[ | [[JNI 2006 | AA. Bibliography#JNI 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="686e1e6a459c79fc-576334cb-43f442ae-bcadba56-a89635c8e66e0c6d9bd35b64"><ac:plain-text-body><![CDATA[ | [[Liang 1997 | AA. Bibliography#Liang 97]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="84fc64d177e3b988-80450b56-43f449a5-924e84b0-dd2f54c19fac19a10ae8e7c7"><ac:plain-text-body><![CDATA[ | [[Macgregor 1998 | AA. Bibliography#Macgregor 98]] | Section 2.2.3, Interfaces and Architectures | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="09a2a2a0bdd04af5-3399d67e-4e4d43b8-8295856d-b6bf733ba742abcb2e901550"><ac:plain-text-body><![CDATA[ | [[SCG 20072009 | AA. Bibliography#SCG 0709]] | Guideline 3-3 Define wrappers around native methods | ]]></ac:plain-text-body></ac:structured-macro> |
...