A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.
Wireless Integrated Network Sensors provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring and safety and security. They combine sensing, signal processing, decision capability, and wireless networking capability in a compact, low power system.
Human Computer Interaction (HCI) as the name suggests, is related to humans and computers and the way, both interact with each other.Because human-computer interaction studies a human and a machine in conjunction, it draws from supporting knowledge on both the machine and the human side. On the machine side, techniques in computer graphics, operating systems, programming languages, and development environments are relevant. On the human side, communication theory, graphic and industrial design disciplines, linguistics, social sciences, cognitive psychology, and human factors are relevant. Attention to human-machine interaction is important, because poorly designed human- machine interfaces can lead to many unexpected problems.In particular, core vision techniques (body, gesture, gaze) and affective interaction (facial expression recognition, and emotion in audio) which are needed for Multimodal Human Computer Interaction (MMHCI) research.