The Fusion of Enterprise Resource Planning and Artificial Intelligence: Leveraging SAP Systems for Predictive Supply Chain Resilience and Performance
Abstract
Large-scale enterprise Java applications often rely on hundreds of third-party libraries. Over time, many of these libraries become outdated, vulnerable, or incompatible with newer environments. Manually managing these vulnerabilities is time-consuming, error-prone, and increasingly difficult as systems scale. This paper presents an AI-assisted approach to automate and prioritize the remediation of dependency vulnerabilities in enterprise systems. By integrating static dependency analysis, security advisories—including Common Vulnerabilities and Exposures (CVEs), which catalog publicly known software flaws—and machine learning models trained on historical resolution patterns, the system can recommend upgrade paths, detect potential breaking changes, and propose targeted refactoring strategies. We evaluate this framework on a real-world enterprise application with over 200 dependencies. Our approach achieves a 60% reduction in manual triage time and improves detection of latent security issues. Furthermore, integration with continuous integration/continuous deployment (CI/CD) pipelines, such as Jenkins, enables proactive and continuous monitoring of dependency health. These findings contribute to both the theory and practice of secure software maintenance in enterprise-scale Java systems.
Keywords
References
Similar Articles
- Anastasiia Livintseva, Re-coding Community: Designing AI-Native Platforms for Trust, Belonging, and Collective Agency , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Alexei Morozov, Prof. Kevin J. Donovan, The Transformative Impact of Containerization on Modern Web Development: An In-depth Analysis of Docker and Kubernetes Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Jonathan Miller, Dr. Emily Carter, A Deep Learning-Based Biometric Authentication Architecture for Banking Fraud Prevention Using Google Teachable Machine and Facial Recognition Analytics , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Dr. Ahmed R. Mostafa, Prof. Mahmoud A. Taha, AFFORDABLE VISION-BASED SYSTEMS FOR REAL-TIME CHESSBOARD DIGITIZATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 01 (2025): Volume 02 Issue 01
- Prof. Elena Rostova, Dr. Kenji Tanaka, Enhancing Stability in Distributed Signed Networks via Local Node Compensation , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Svetlana Petrova, Beyond Hyperscale: The Socio-Technical Adaptation of Site Reliability Engineering for Enhanced Resilience in Critical Infrastructure , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Joshua Muller, Zero-Trust Transformation in Healthcare IT: Securing Legacy Medical Devices Through Windows 11 Modernization in Clinical Workstations , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Alistair J. Finch, Sustainable Development and Mechanical Performance of Natural Fiber–Reinforced Polymer Composites: Comprehensive Analysis, Methodologies, and Future Directions , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 05 (2025): Volume 02 Issue 05
- Dr. Elias R. Vance, Prof. Seraphina J. Choi, A Machine Learning Framework for Predicting Cardiovascular Disease Risk: A Comparative Analysis Using the UCI Heart Disease Dataset , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Anh N. Tran, Siew H. Lim, A Critical Analysis of Apache Kafka's Role in Advancing Microservices Architecture: Performance, Patterns, and Persistence , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
You may also start an advanced similarity search for this article.