• 只僵尸直接穿到植物背后攻击它们,磁力或者双向射手干掉它们!

    This zombie will dig under your plants and attack from the back. Use magnet-shrooms or split-peas to take care of him.

    youdao

  • 网络攻击通常攻击最后目标使用双向交互式连接一系列中间主机(跳板机)掩盖真实攻击路径

    Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones) before they attack the final target.

    youdao

  • 方案能够进行双向身份验证有效地防止了冒充攻击重放攻击小数攻击从而提高了认证系统安全性

    This two-way identity authentication scheme effectively prevents imitate attack, replay attack and decimal fraction attack. And the security of authentication system is enhanced.

    youdao

  • 由此实现了双向身份验证,同时保证服务器用户安全可以有效的防止冒充攻击重放攻击小数攻击

    The two-way identity authentication is implemented and the security of the host and the users is assured, which can keep them from imitate attack, replay attack and small number attack.

    youdao

  • 由此实现了双向身份验证,同时保证服务器用户安全可以有效的防止冒充攻击重放攻击小数攻击

    The two-way identity authentication is implemented and the security of the host and the users is assured, which can keep them from imitate attack, replay attack and small number attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定