1. A detailed analysis of the hash-flooding DoS attack against MurmurHash, including a step-by-step explanation of how the attack works and how it can be mitigated.