What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach

Open in new window