How to Configure Masked Event Anomaly Detection on Software Logs? | IEEE Conference Publication | IEEE Xplore