...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="355d28f31fccf712-e1242ed1-4d714443-8e8d8903-b64c3223953e8db3c333d0f8"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | [Method | http://java.sun.com/javase/6/docs/api/java/security/AccessController.html#doPrivileged(java.security.PrivilegedAction)] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8b0214046a4198b1-776cea06-4e5c4bba-b1cebc15-9a85138075449b70b80c6a3c"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | Sections 6.4, | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9086886ea39be12d-82f6d2a6-4245410e-9ac4a99b-092b18701788d0a909c5c5f7"><ac:plain-text-body><![CDATA[ | [[Jovanovic 2006 | AA. Bibliography#Jovanovic 06]] | Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities | ]]></ac:plain-text-body></ac:structured-macro> |
...