The Fusion of Enterprise Resource Planning and Artificial Intelligence: Leveraging SAP Systems for Predictive Supply Chain Resilience and Performance
Abstract
Large-scale enterprise Java applications often rely on hundreds of third-party libraries. Over time, many of these libraries become outdated, vulnerable, or incompatible with newer environments. Manually managing these vulnerabilities is time-consuming, error-prone, and increasingly difficult as systems scale. This paper presents an AI-assisted approach to automate and prioritize the remediation of dependency vulnerabilities in enterprise systems. By integrating static dependency analysis, security advisories—including Common Vulnerabilities and Exposures (CVEs), which catalog publicly known software flaws—and machine learning models trained on historical resolution patterns, the system can recommend upgrade paths, detect potential breaking changes, and propose targeted refactoring strategies. We evaluate this framework on a real-world enterprise application with over 200 dependencies. Our approach achieves a 60% reduction in manual triage time and improves detection of latent security issues. Furthermore, integration with continuous integration/continuous deployment (CI/CD) pipelines, such as Jenkins, enables proactive and continuous monitoring of dependency health. These findings contribute to both the theory and practice of secure software maintenance in enterprise-scale Java systems.
Keywords
References
Similar Articles
- Dr. Arjun S. Patel, Prof. Elena D. Petrovna, CONVERGENT DATABASE ARCHITECTURES: MULTI-MODEL DESIGN AND QUERY OPTIMIZATION IN NEWSQL SYSTEMS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Elena M. Novak, Dr. Sofia M. Petrov, Dr. Amina R. El-Sayed, Toward an Integrated AI-Enabled Precision Oncology Framework: Linking Brain Tumor Imaging, Peptide Therapeutics, Chemotherapy Toxicity, and Financial Burden in Contemporary Cancer Care , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 03 (2026): Volume03 Issue03
- Dr. Rohan Verma, Dr. Sneha Kulkarni, Machine-Learning Architectures enabling Human Trait Verification Alternatives within Risk-Coverage Ecosystems: Resilient Identity Validation, Policy Adherence , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Dr. Eleanor Whitfield, Architecting Secure and Cost-Optimized Iot-Cloud Ecosystems: Integrating AI-Driven Intrusion Detection, Multi-Path Routing, And Intelligent Workload Scheduling in Distributed Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Julian Blackwood, Professor Elara Croft, REAL-TIME DIGITAL TWIN FOR STEWART PLATFORM CONTROL AND TRAJECTORY SYNTHESIS , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Emiliano R. Vassalli, Event-Driven Architectures in Fintech Systems: A Comprehensive Theoretical, Methodological, and Resilience-Oriented Analysis of Kafka-Centric Microservices , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Prof. Elise Vandermark, INTEGRATING LAKEHOUSE ARCHITECTURES AND CLOUD DATA WAREHOUSING FOR NEXT-GENERATION ENTERPRISE ANALYTICS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Leila Mansouri, Cloud Computing AsInfrastructural ESG Capital: Strategic Implications For Corporate Sustainability , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Martin Schneider, Diego Martínez, A Comparative Benchmark Analysis of Transactional and Analytical Performance in PostgreSQL and MySQL , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Prof. Lucas F. Oliveira, SM9-ENHANCED KEY-POLICY ATTRIBUTE-BASED ENCRYPTION: DESIGN, ANALYSIS, AND APPLICATIONS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
You may also start an advanced similarity search for this article.