From ae368e54c9c1b5005ad0ee12877baeb63915fea6 Mon Sep 17 00:00:00 2001
From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr>
Date: Tue, 13 Feb 2024 11:18:44 +0000
Subject: [PATCH] Update file README.md

---
 README.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/README.md b/README.md
index ef91780..09a415f 100644
--- a/README.md
+++ b/README.md
@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
 
 ## Key Features
 
-Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
-Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
-Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
-Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
+- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
+- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
+- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
+- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
 
 ## Dataset Access
 
-- 
GitLab