https://www.jurnal.jurmat.com/index.php/jmt/issue/feedJournal of Math Tadris 2026-04-03T08:10:36+08:00M. Habib Husnial Pardijurnaljmt@gmail.comOpen Journal Systems<p><strong>Journal of Math Tadris (jMt)<br /></strong>ISSN <a href="https://issn.brin.go.id/terbit/detail/1615861060">2776-0316</a> (Online) | <a href="https://issn.brin.go.id/terbit/detail/1616742046" target="_blank" rel="noopener">2776-1533</a> (Print)<br />DOI Prefix: <a href="https://doi.org/10.55099/jurmat.v1i1">10.55099/jurmat</a> by <a href="https://search.crossref.org/?from_ui=yes&q=2776-0316">Crossref </a><br />Frequency: Two Issues per year (March & September)<br />Status: <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view">Accredited Sinta 5</a> <br />Publisher: State Islamic University of Mataram</p> <p>Journal of Math Tadris (jMt) menerbitkan penelitian pada disiplin ilmu pendidikan matematika di sekolah dan perguruan tinggi termasuk model pembelajaran matematika, pembelajaran matematika berbasis digital, Studi ethnomatematika, assesment dan evaluasi pembelajaran matematika, integrasi nilai-nilai Islam dan matematika, dan psikologi pembelajaran matematika.<br />Jurnal ini diterbitkan secara berkala dua kali setahun. Penulis harus membaca <a href="https://jurnal.jurmat.com/index.php/jmt/authorguidlines" target="_blank" rel="noopener">pedoman penulis</a> dan menyetujui persyaratan <a href="https://jurnal.jurmat.com/index.php/jmt/Copyright" target="_blank" rel="noopener">hak cipta dan lisensi</a> sebelum mengirimkan artikel.<br /><strong>Indexing by</strong><br /><a href="https://search.crossref.org/?from_ui=yes&q=2776-0316" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/cross.png" alt="" width="100" height="33" /></a> <a href="https://scholar.google.com/citations?hl=id&user=RkatgZYAAAAJ&scilu=&scisig=AMD79ooAAAAAYG_syHA0hrf7iRdSeQ-KAKjnNAAiv2ru&gmla=AJsN-F5TtyV56tMgWPRKQK4wnUM-IZUTR3JQ3lxGfzbT9DnxLEfaaXr9e9XxtI5IhQhdWy4nPvolwRsawufENgRKg-1fBJZih795QuU8Yfz6VL3lxiuQU7ZmW6nqHYUc8sOP9YD8l3kO&sciund=13875966764180793895" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gs.png" alt="" width="100" height="33" /></a> <a href="https://garuda.kemdikbud.go.id/journal/view/22995" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gar.png" alt="" width="100" height="33" /></a> <a href="https://moraref.kemenag.go.id/archives/journal/99226966393150187"><img src="https://jurnal.jurmat.com/public/site/images/admin/moraref.png" alt="" width="100" height="33" /></a> <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view"><img src="https://jurnal.jurmat.com/public/site/images/admin/sin.png" alt="" width="100" height="33" /></a></p>https://www.jurnal.jurmat.com/index.php/jmt/article/view/266PEMBERDAYAAN KOMUNITAS PENJAHIT WANITA MELALUI OPTIMALISASI PEMANFAATAN KAIN SISA MENJADI PRODUK BERNILAI EKONOMI 2026-04-03T08:10:36+08:00Siti Hajaroh Hajarohhajaroh@uinmataram.ac.id<p>This Community Service activity aims to provide training and assistance in empowering the women's sewing community through the optimal utilization of fabric scraps to create products of economic value in Adeng Hamlet. The method used in this community service activity is the Asset-Based Community Development (ABCD) method. The ABCD method prioritizes the utilization of the potential of a group of people or community around the area. The Asset-Based Community Development (ABCD) method has five key steps, including: Discovery, Dream, Design, Define, and Destiny. The achievement of the community service activity can be said to be very good. In addition to receiving a positive response from the community, the participants were also able to produce products from parca fabric with a higher economic value than before. The enthusiasm of the community was also evident from the 100% attendance of the participants who were punctual in attending this activity from the beginning to the end. This assistance activity was then reported and compiled as a form of accountability by the lecturers as facilitators of the activity, which is a manifestation of the Tri Dharma Perguruan Tinggi (Three Pillars of Higher Education) in the field of Community Service.</p>Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/265S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale2026-03-06T08:18:23+08:00John Rodriguezauthor8x0ygo@tempmail.org<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/263The Effectiveness of STEM-Based Project-Based Learning in Improving Students’ Relational Mathematical Understanding2026-01-18T16:58:50+08:00Riyanto Dwi Saputra Anangmasanangriyan20@gmail.comAlfira Mulya Astutialfiramulyastuti@uinmataram.ac.idErpin Evendierpin_evendi@uinmataram.ac.id<p><em>This study examined the effectiveness of STEM-based learning integrated with the Project-Based Learning (PjBL) approach in enhancing eighth-grade students’ relational mathematical understanding at SMP Negeri 1 Batukliang during the 2025/2026 academic year. A quantitative approach with a quasi-experimental method employing a pretest–posttest control group design was used. The population comprised all eighth-grade students of SMP Negeri 1 Batukliang (206 students). Using purposive sampling, two classes were selected: Class VIII3 as the control group and Class VIII4 as the experimental group, involving a total of 56 students. Data were collected through an essay-type test measuring relational mathematical understanding, administered at the pretest and posttest stages. Data analysis employed descriptive and inferential statistics using SPSS version 27, including normality and homogeneity tests, N-Gain analysis, and an Independent Samples t-test. The results showed that the average N-Gain score of the experimental class was 0.4906 (moderate category), which was higher than that of the control class at 0.2889 (low category). Furthermore, the t-test revealed a significance value of 0.000 (< 0.05). These findings indicate that STEM-based learning integrated with the PjBL approach is effective in improving students’ relational mathematical understanding.</em></p>2025-11-24T00:00:00+08:00Copyright (c) 2026 Riyanto Dwi Saputra Anang, Alfira Mulya Astuti, Erpin Evendihttps://www.jurnal.jurmat.com/index.php/jmt/article/view/262S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale2026-01-15T03:05:00+08:00Jane Thomasacademicxx3g2w@tempmail.org<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/261S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale2026-01-02T06:04:06+08:00Michael Walkeruser7syoi9@tempmail.org<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>Copyright (c)