diff --git a/README.md b/README.md
index ef91780a9f767c1d2097f5a707a76ef45d045ec4..09a415f1d29bdfd580fd77778bc82f88481bc7e6 100644
--- a/README.md
+++ b/README.md
@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
 
 ## Key Features
 
-Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
-Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
-Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
-Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
+- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
+- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
+- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
+- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
 
 ## Dataset Access