Journal of Math Tadris https://www.jurnal.jurmat.com/index.php/jmt <p><strong>Journal of Math Tadris (jMt)<br /></strong>ISSN <a href="https://issn.brin.go.id/terbit/detail/1615861060">2776-0316</a> (Online) | <a href="https://issn.brin.go.id/terbit/detail/1616742046" target="_blank" rel="noopener">2776-1533</a> (Print)<br />DOI Prefix: <a href="https://doi.org/10.55099/jurmat.v1i1">10.55099/jurmat</a> by <a href="https://search.crossref.org/?from_ui=yes&amp;q=2776-0316">Crossref </a><br />Frequency: Two Issues per year (March &amp; September)<br />Status: <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view">Accredited Sinta 5</a> <br />Publisher: State Islamic University of Mataram</p> <p>Journal of Math Tadris (jMt) menerbitkan penelitian pada disiplin ilmu pendidikan matematika di sekolah dan perguruan tinggi termasuk model pembelajaran matematika, pembelajaran matematika berbasis digital, Studi ethnomatematika, assesment dan evaluasi pembelajaran matematika, integrasi nilai-nilai Islam dan matematika, dan psikologi pembelajaran matematika.<br />Jurnal ini diterbitkan secara berkala dua kali setahun. Penulis harus membaca <a href="https://jurnal.jurmat.com/index.php/jmt/authorguidlines" target="_blank" rel="noopener">pedoman penulis</a> dan menyetujui persyaratan <a href="https://jurnal.jurmat.com/index.php/jmt/Copyright" target="_blank" rel="noopener">hak cipta dan lisensi</a> sebelum mengirimkan artikel.<br /><strong>Indexing by</strong><br /><a href="https://search.crossref.org/?from_ui=yes&amp;q=2776-0316" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/cross.png" alt="" width="100" height="33" /></a> <a href="https://scholar.google.com/citations?hl=id&amp;user=RkatgZYAAAAJ&amp;scilu=&amp;scisig=AMD79ooAAAAAYG_syHA0hrf7iRdSeQ-KAKjnNAAiv2ru&amp;gmla=AJsN-F5TtyV56tMgWPRKQK4wnUM-IZUTR3JQ3lxGfzbT9DnxLEfaaXr9e9XxtI5IhQhdWy4nPvolwRsawufENgRKg-1fBJZih795QuU8Yfz6VL3lxiuQU7ZmW6nqHYUc8sOP9YD8l3kO&amp;sciund=13875966764180793895" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gs.png" alt="" width="100" height="33" /></a> <a href="https://garuda.kemdikbud.go.id/journal/view/22995" target="_blank" rel="noopener"><img src="https://jurnal.jurmat.com/public/site/images/admin/gar.png" alt="" width="100" height="33" /></a> <a href="https://moraref.kemenag.go.id/archives/journal/99226966393150187"><img src="https://jurnal.jurmat.com/public/site/images/admin/moraref.png" alt="" width="100" height="33" /></a> <a href="https://drive.google.com/file/d/1NTJkKyfX87ER3K5OJDblpPMd9yFSewyj/view"><img src="https://jurnal.jurmat.com/public/site/images/admin/sin.png" alt="" width="100" height="33" /></a></p> en-US jurnaljmt@gmail.com (M. Habib Husnial Pardi) jurnaljmt@gmail.com (Erpin Evendi) Mon, 24 Nov 2025 00:00:00 +0800 OJS 3.2.1.2 http://blogs.law.harvard.edu/tech/rss 60 PEMBERDAYAAN KOMUNITAS PENJAHIT WANITA MELALUI OPTIMALISASI PEMANFAATAN KAIN SISA MENJADI PRODUK BERNILAI EKONOMI https://www.jurnal.jurmat.com/index.php/jmt/article/view/266 <p>This Community Service activity aims to provide training and assistance in empowering the women's sewing community through the optimal utilization of fabric scraps to create products of economic value in Adeng Hamlet. The method used in this community service activity is the Asset-Based Community Development (ABCD) method. The ABCD method prioritizes the utilization of the potential of a group of people or community around the area. The Asset-Based Community Development (ABCD) method has five key steps, including: Discovery, Dream, Design, Define, and Destiny. The achievement of the community service activity can be said to be very good. In addition to receiving a positive response from the community, the participants were also able to produce products from parca fabric with a higher economic value than before. The enthusiasm of the community was also evident from the 100% attendance of the participants who were punctual in attending this activity from the beginning to the end. This assistance activity was then reported and compiled as a form of accountability by the lecturers as facilitators of the activity, which is a manifestation of the Tri Dharma Perguruan Tinggi (Three Pillars of Higher Education) in the field of Community Service.</p> Siti Hajaroh Hajaroh Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/266 S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale https://www.jurnal.jurmat.com/index.php/jmt/article/view/265 <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> John Rodriguez Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/265 The Effectiveness of STEM-Based Project-Based Learning in Improving Students’ Relational Mathematical Understanding https://www.jurnal.jurmat.com/index.php/jmt/article/view/263 <p><em>This study examined the effectiveness of STEM-based learning integrated with the Project-Based Learning (PjBL) approach in enhancing eighth-grade students’ relational mathematical understanding at SMP Negeri 1 Batukliang during the 2025/2026 academic year. A quantitative approach with a quasi-experimental method employing a pretest–posttest control group design was used. The population comprised all eighth-grade students of SMP Negeri 1 Batukliang (206 students). Using purposive sampling, two classes were selected: Class VIII3 as the control group and Class VIII4 as the experimental group, involving a total of 56 students. Data were collected through an essay-type test measuring relational mathematical understanding, administered at the pretest and posttest stages. Data analysis employed descriptive and inferential statistics using SPSS version 27, including normality and homogeneity tests, N-Gain analysis, and an Independent Samples t-test. The results showed that the average N-Gain score of the experimental class was 0.4906 (moderate category), which was higher than that of the control class at 0.2889 (low category). Furthermore, the t-test revealed a significance value of 0.000 (&lt; 0.05). These findings indicate that STEM-based learning integrated with the PjBL approach is effective in improving students’ relational mathematical understanding.</em></p> Riyanto Dwi Saputra Anang, Alfira Mulya Astuti, Erpin Evendi Copyright (c) 2026 Riyanto Dwi Saputra Anang, Alfira Mulya Astuti, Erpin Evendi https://creativecommons.org/licenses/by-sa/4.0 https://www.jurnal.jurmat.com/index.php/jmt/article/view/263 Mon, 24 Nov 2025 00:00:00 +0800 S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale https://www.jurnal.jurmat.com/index.php/jmt/article/view/262 <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> Jane Thomas Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/262 S Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale https://www.jurnal.jurmat.com/index.php/jmt/article/view/261 <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> Michael Walker Copyright (c) https://www.jurnal.jurmat.com/index.php/jmt/article/view/261