Journal of Math Tadris
https://www.jurnal.jurmat.com/index.php/jmt
<p><strong>Journal of Math Tadris (jMt)<br /></strong>ISSN <a href="https://issn.brin.go.id/terbit/detail/1615861060">2776-0316</a> (Online) | <a href="https://issn.brin.go.id/terbit/detail/1616742046" target="_blank" rel="noopener">2776-1533</a> (Print)<br />DOI Prefix: <a href="https://doi.org/10.55099/jurmat.v1i1">10.55099/jurmat</a> by <a href="https://search.crossref.org/?from_ui=yes&q=2776-0316">Crossref </a><br />Frequency: Two Issues per year (March & September)<br />Status: <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view">Accredited Sinta 5</a> <br />Publisher: State Islamic University of Mataram</p> <p>Journal of Math Tadris (jMt) menerbitkan penelitian pada disiplin ilmu pendidikan matematika di sekolah dan perguruan tinggi termasuk model pembelajaran matematika, pembelajaran matematika berbasis digital, Studi ethnomatematika, assesment dan evaluasi pembelajaran matematika, integrasi nilai-nilai Islam dan matematika, dan psikologi pembelajaran matematika.<br />Jurnal ini diterbitkan secara berkala dua kali setahun. Penulis harus membaca <a href="https://jurnal.jurmat.com/index.php/jmt/authorguidlines" target="_blank" rel="noopener">pedoman penulis</a> dan menyetujui persyaratan <a href="https://jurnal.jurmat.com/index.php/jmt/Copyright" target="_blank" rel="noopener">hak cipta dan lisensi</a> sebelum mengirimkan artikel.<br /><strong>Indexing by</strong><br /><a href="https://search.crossref.org/?from_ui=yes&q=2776-0316" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/cross.png" alt="" width="100" height="33" /></a> <a href="https://scholar.google.com/citations?hl=id&user=RkatgZYAAAAJ&scilu=&scisig=AMD79ooAAAAAYG_syHA0hrf7iRdSeQ-KAKjnNAAiv2ru&gmla=AJsN-F5TtyV56tMgWPRKQK4wnUM-IZUTR3JQ3lxGfzbT9DnxLEfaaXr9e9XxtI5IhQhdWy4nPvolwRsawufENgRKg-1fBJZih795QuU8Yfz6VL3lxiuQU7ZmW6nqHYUc8sOP9YD8l3kO&sciund=13875966764180793895" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gs.png" alt="" width="100" height="33" /></a> <a href="https://garuda.kemdikbud.go.id/journal/view/22995" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gar.png" alt="" width="100" height="33" /></a> <a href="https://moraref.kemenag.go.id/archives/journal/99226966393150187"><img src="https://jurnal.jurmat.com/public/site/images/admin/moraref.png" alt="" width="100" height="33" /></a> <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view"><img src="https://jurnal.jurmat.com/public/site/images/admin/sin.png" alt="" width="100" height="33" /></a></p>Mathematic Education Departement, State Islamic University of Mataramen-USJournal of Math Tadris 2776-1533PEMBERDAYAAN KOMUNITAS PENJAHIT WANITA MELALUI OPTIMALISASI PEMANFAATAN KAIN SISA MENJADI PRODUK BERNILAI EKONOMI
https://www.jurnal.jurmat.com/index.php/jmt/article/view/266
<p>This Community Service activity aims to provide training and assistance in empowering the women's sewing community through the optimal utilization of fabric scraps to create products of economic value in Adeng Hamlet. The method used in this community service activity is the Asset-Based Community Development (ABCD) method. The ABCD method prioritizes the utilization of the potential of a group of people or community around the area. The Asset-Based Community Development (ABCD) method has five key steps, including: Discovery, Dream, Design, Define, and Destiny. The achievement of the community service activity can be said to be very good. In addition to receiving a positive response from the community, the participants were also able to produce products from parca fabric with a higher economic value than before. The enthusiasm of the community was also evident from the 100% attendance of the participants who were punctual in attending this activity from the beginning to the end. This assistance activity was then reported and compiled as a form of accountability by the lecturers as facilitators of the activity, which is a manifestation of the Tri Dharma Perguruan Tinggi (Three Pillars of Higher Education) in the field of Community Service.</p>Siti Hajaroh Hajaroh
Copyright (c)
52S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale
https://www.jurnal.jurmat.com/index.php/jmt/article/view/265
<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>John Rodriguez
Copyright (c)
52The Effectiveness of STEM-Based Project-Based Learning in Improving Students’ Relational Mathematical Understanding
https://www.jurnal.jurmat.com/index.php/jmt/article/view/263
<p><em>This study examined the effectiveness of STEM-based learning integrated with the Project-Based Learning (PjBL) approach in enhancing eighth-grade students’ relational mathematical understanding at SMP Negeri 1 Batukliang during the 2025/2026 academic year. A quantitative approach with a quasi-experimental method employing a pretest–posttest control group design was used. The population comprised all eighth-grade students of SMP Negeri 1 Batukliang (206 students). Using purposive sampling, two classes were selected: Class VIII3 as the control group and Class VIII4 as the experimental group, involving a total of 56 students. Data were collected through an essay-type test measuring relational mathematical understanding, administered at the pretest and posttest stages. Data analysis employed descriptive and inferential statistics using SPSS version 27, including normality and homogeneity tests, N-Gain analysis, and an Independent Samples t-test. The results showed that the average N-Gain score of the experimental class was 0.4906 (moderate category), which was higher than that of the control class at 0.2889 (low category). Furthermore, the t-test revealed a significance value of 0.000 (< 0.05). These findings indicate that STEM-based learning integrated with the PjBL approach is effective in improving students’ relational mathematical understanding.</em></p>Riyanto Dwi Saputra AnangAlfira Mulya AstutiErpin Evendi
Copyright (c) 2026 Riyanto Dwi Saputra Anang, Alfira Mulya Astuti, Erpin Evendi
https://creativecommons.org/licenses/by-sa/4.0
2025-11-242025-11-2452132510.55099/jurmat.v5i2.263S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale
https://www.jurnal.jurmat.com/index.php/jmt/article/view/262
<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>Jane Thomas
Copyright (c)
52S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale
https://www.jurnal.jurmat.com/index.php/jmt/article/view/261
<p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p>Michael Walker
Copyright (c)
52