...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2940cc1fc46d1560-1b6b7a08-42a14018-8c0b8b8e-ea9b7cc91aa1de3e6b7f2c9a"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | [Method | http://java.sun.com/javase/6/docs/api/java/security/AccessController.html#doPrivileged(java.security.PrivilegedAction)] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0071c7c564bd90ae-54d070f3-4a784a6a-9cf48cfb-ae18f6496228cc2d7d91d71c"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | Sections 6.4, | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="35e54d2b3c777b26-67dc432b-48ed428f-bfdaa99f-96a7882b9a1a1dd30827e717"><ac:plain-text-body><![CDATA[ | [[Jovanovic 2006 | AA. Bibliography#Jovanovic 06]] | Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities | ]]></ac:plain-text-body></ac:structured-macro> |
...