diff --git a/AI4Forensics/CKIM2024/readme.md b/AI4Forensics/CKIM2024/readme.md
index 5f7e56a..1cfc2ee 100644
--- a/AI4Forensics/CKIM2024/readme.md
+++ b/AI4Forensics/CKIM2024/readme.md
@@ -48,7 +48,7 @@ By fostering a collaborative learning environment, this tutorial aims to empower
The cyber incident report documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs.
-Here is an example of a reconstructed digital forensics knowledge graph:
+Here is an example of a reconstructed digital forensics knowledge graph:
### Political Insight Analysis Leveraging LLMs