...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="31fbcf31740da45e-d19d1cc4-45984d53-a17ba647-defd030e46888f3015ae9990"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API References#API 06]] | [Method | http://java.sun.com/javase/6/docs/api/java/security/AccessController.html#doPrivileged(java.security.PrivilegedAction)] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="927bccd24de61231-e4ec0876-4c9a4d35-8b9e90a2-98046b75b73a49acfb24a182"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong References#Gong 03]] | Sections 6.4, | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2e14c6dc8ccec7f8-7036c6ad-48074521-a9778139-769e7687540b61b7c30fbc70"><ac:plain-text-body><![CDATA[ | [[Jovanovic 2006 | AA. Bibliography#Jovanovic References#Jovanovic 06]] | Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities | ]]></ac:plain-text-body></ac:structured-macro> |
...