The Fusion of Enterprise Resource Planning and Artificial Intelligence: Leveraging SAP Systems for Predictive Supply Chain Resilience and Performance
Abstract
Large-scale enterprise Java applications often rely on hundreds of third-party libraries. Over time, many of these libraries become outdated, vulnerable, or incompatible with newer environments. Manually managing these vulnerabilities is time-consuming, error-prone, and increasingly difficult as systems scale. This paper presents an AI-assisted approach to automate and prioritize the remediation of dependency vulnerabilities in enterprise systems. By integrating static dependency analysis, security advisories—including Common Vulnerabilities and Exposures (CVEs), which catalog publicly known software flaws—and machine learning models trained on historical resolution patterns, the system can recommend upgrade paths, detect potential breaking changes, and propose targeted refactoring strategies. We evaluate this framework on a real-world enterprise application with over 200 dependencies. Our approach achieves a 60% reduction in manual triage time and improves detection of latent security issues. Furthermore, integration with continuous integration/continuous deployment (CI/CD) pipelines, such as Jenkins, enables proactive and continuous monitoring of dependency health. These findings contribute to both the theory and practice of secure software maintenance in enterprise-scale Java systems.
Keywords
References
Similar Articles
- Dr. Elias R. Vance, Prof. Seraphina J. Choi, A Machine Learning Framework for Predicting Cardiovascular Disease Risk: A Comparative Analysis Using the UCI Heart Disease Dataset , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Anh N. Tran, Siew H. Lim, A Critical Analysis of Apache Kafka's Role in Advancing Microservices Architecture: Performance, Patterns, and Persistence , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Prof. Isabella Rossi, Dr. Luis Fernando Páez, GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Rania E. El-Gamal, EMPIRICAL CHARACTERIZATION OF IOT FIRMWARE VERSION DIVERSITY AND PATCHING STATUS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Rakesh T. Sharma, Dr. Neha R. Kulkarni, GUIDING SEARCH-BASED SOFTWARE TESTING WITH DEFECT PREDICTION: AN EMPIRICAL INVESTIGATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Felicia S. Lee, Ivan A. Kuznetsov, Bridging The Gap: A Strategic Framework for Integrating Site Reliability Engineering with Legacy Retail Infrastructure , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Alistair J. Finch, Integrating Jira, Jenkins, and Azure DevOps to Optimize Software Release Pipelines , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Pedro C. Almeida, Prof. Laura B. Heinrich, LOCAL NODE COMPENSATION FOR ENHANCED STABILITY IN DISTRIBUTED SIGNED NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Dr. Carlos A. Benítez, Prof. Prashant Singh Baghel, UNVEILING AFFLUENCE: A BIG DATA PERSPECTIVE ON WEALTH ACCUMULATION AND DISTRIBUTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Puspita Sari, Nathanael Sianipar, A DESIGN SCIENCE APPROACH TO MITIGATING INTER-SERVICE INTEGRATION FAILURES IN MICROSERVICE ARCHITECTURES: THE CONSUMER-DRIVEN CONTRACT TESTING FRAMEWORK AND PILOT IMPLEMENTATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
You may also start an advanced similarity search for this article.