diff --git a/README.md b/README.md
index 215a66b67ccf604c40f9c862f45378a9b0d21dcd..97bc1deb2fa850ab38fdad2b87a07bf9bb5df0ec 100644
--- a/README.md
+++ b/README.md
@@ -21,7 +21,7 @@ The dataset consists of network traffic data captured from emulated IoT network
 <em>Overview of the IoT network architecture</em>
 </div>
 
-You find in this dataset the graph that contains all the attacks and also one graph per attack. The graph containing all attacks is the merge of attack graphs include normal traffic. 
+You find in this dataset the graph that contains all the attacks and the Pcap csv file per attack. The graph containing all attacks is the merge of attacks including normal traffic. 
 
 To construct our dataset, we initially establish a test environment mirroring real-world networks and subsequently simulate diverse forms of attacks. Our testbed architecture comprises two primary components: the user network and the adversary network. Within the user network, we incorporate standard elements typical of IoT networks, including end-user devices executing various tasks to replicate the traffic patterns commonly encountered in such networks. Additionally, virtual machines emulate smart devices (IoT Devices), generating typical traffic associated with these devices. Furthermore, we integrate an onsite server furnishing services to network users, serving as the focal point for the attacks we execute on the network.