...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c5731cc4e3f0bdda-10b08d43-437f45ca-8dd497ce-dbe1184461c0a5d77650e15a"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE ID 111 | http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d381903c770e6ec8-4817ea04-46ae4fe0-b3a29fbf-ce010ac2a4fdedd4771c3e07"><ac:plain-text-body><![CDATA[ | [[Fairbanks 2007 | AA. Bibliography#Fairbanks 07]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7b2e1ee09da2a87a-d427d5ea-498945d5-8fbc9b2f-c6ad4a4e58ebeb3b0b6d255b"><ac:plain-text-body><![CDATA[ | [[JNI 2006 | AA. Bibliography#JNI 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e427e6923221a8dc-ebee3bf7-4f0c4ad5-964b81a3-0c9b60a94dca1709bed8e5c2"><ac:plain-text-body><![CDATA[ | [[Liang 1997 | AA. Bibliography#Liang 97]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b7a12650e3b5c73b-f3528fe8-48704391-8a08b912-e56ddc208a939d3f029fddb4"><ac:plain-text-body><![CDATA[ | [[Macgregor 1998 | AA. Bibliography#Macgregor 98]] | Section 2.2.3, Interfaces and Architectures | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3e26db500e7975d7-e57a2923-42864986-923889b1-0a30fda71e0a705b0f656f0b"><ac:plain-text-body><![CDATA[ | [[SCG 20072009 | AA. Bibliography#SCG 0709]] | Guideline 3-3 Define wrappers around native methods | ]]></ac:plain-text-body></ac:structured-macro> |
...