The Fusion of Enterprise Resource Planning and Artificial Intelligence: Leveraging SAP Systems for Predictive Supply Chain Resilience and Performance
Abstract
Large-scale enterprise Java applications often rely on hundreds of third-party libraries. Over time, many of these libraries become outdated, vulnerable, or incompatible with newer environments. Manually managing these vulnerabilities is time-consuming, error-prone, and increasingly difficult as systems scale. This paper presents an AI-assisted approach to automate and prioritize the remediation of dependency vulnerabilities in enterprise systems. By integrating static dependency analysis, security advisories—including Common Vulnerabilities and Exposures (CVEs), which catalog publicly known software flaws—and machine learning models trained on historical resolution patterns, the system can recommend upgrade paths, detect potential breaking changes, and propose targeted refactoring strategies. We evaluate this framework on a real-world enterprise application with over 200 dependencies. Our approach achieves a 60% reduction in manual triage time and improves detection of latent security issues. Furthermore, integration with continuous integration/continuous deployment (CI/CD) pipelines, such as Jenkins, enables proactive and continuous monitoring of dependency health. These findings contribute to both the theory and practice of secure software maintenance in enterprise-scale Java systems.
Keywords
References
Similar Articles
- Pedro C. Almeida, Prof. Laura B. Heinrich, LOCAL NODE COMPENSATION FOR ENHANCED STABILITY IN DISTRIBUTED SIGNED NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Dr. Carlos A. Benítez, Prof. Prashant Singh Baghel, UNVEILING AFFLUENCE: A BIG DATA PERSPECTIVE ON WEALTH ACCUMULATION AND DISTRIBUTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Alistair Sterling, Architectural Evolution and Decomposition Strategies: A Comprehensive Analysis of Microservice Migration, Performance Optimization, And Machine Learning-Assisted Service Boundary Detection , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Puspita Sari, Nathanael Sianipar, A DESIGN SCIENCE APPROACH TO MITIGATING INTER-SERVICE INTEGRATION FAILURES IN MICROSERVICE ARCHITECTURES: THE CONSUMER-DRIVEN CONTRACT TESTING FRAMEWORK AND PILOT IMPLEMENTATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- John A. Prescott, A Unified Framework for Time-Sensitive and Resilient In-Vehicle Communication: Integrating Automotive Ethernet, Wireless TSN, and IoTEnabled Vehicle Health Monitoring , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 08 (2025): Volume 02 Issue 08
- Dr. Andika Prasetyo, Siti Rahmawati, M.Sc., Rizky Maulana, Structured Teaching Framework Focused on Beginner-Level Software Development Skills , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Abdulrahman O. Nassar, Dr. Cheng-Hao Lin, CHARACTERIZING CORE-PERIPHERY STRUCTURES IN NETWORKS VIA PRINCIPAL COMPONENT ANALYSIS OF NEIGHBORHOOD-BASED BRIDGE NODE CENTRALITY , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Nurul H. Zulkifli, Dr. Farah M. Rahimi, ACCOUNTABLE DATA AUTHORIZATION IN CLOUD ENVIRONMENTS: AN IDENTITY-BASED ENCRYPTION FRAMEWORK WITH EQUALITY TESTING , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 01 (2025): Volume 02 Issue 01
- Dr. Erik G. Johansson, Dr. Linnea K. Blomqvist, LEVERAGING PERSISTENCE AND GRAPH NEURAL NETWORKS FOR ENHANCED INFORMATION POPULARITY FORECASTING , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Dr. Sofia Duarte, Jiwon Park, SECURING LARGE-SCALE IOT NETWORKS: A FEDERATED TRANSFER LEARNING APPROACH FOR REAL-TIME INTRUSION DETECTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
You may also start an advanced similarity search for this article.